Hay
Date
June 26, 2025, 9:10 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 1523.222402] ==================================================================
[ 1523.222430] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[ 1523.222466] Write of size 1 at addr ffff000800d210c9 by task kunit_try_catch/229
[ 1523.222499] 
[ 1523.222513] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.222571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.222589] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.222610] Call trace:
[ 1523.222621]  show_stack+0x20/0x38 (C)
[ 1523.222657]  dump_stack_lvl+0x8c/0xd0
[ 1523.222695]  print_report+0x118/0x608
[ 1523.222734]  kasan_report+0xdc/0x128
[ 1523.222773]  __asan_report_store1_noabort+0x20/0x30
[ 1523.222809]  krealloc_less_oob_helper+0xa48/0xc50
[ 1523.222848]  krealloc_less_oob+0x20/0x38
[ 1523.222884]  kunit_try_run_case+0x170/0x3f0
[ 1523.222921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.222965]  kthread+0x328/0x630
[ 1523.222995]  ret_from_fork+0x10/0x20
[ 1523.223031] 
[ 1523.223040] Allocated by task 229:
[ 1523.223056]  kasan_save_stack+0x3c/0x68
[ 1523.223088]  kasan_save_track+0x20/0x40
[ 1523.223120]  kasan_save_alloc_info+0x40/0x58
[ 1523.223146]  __kasan_krealloc+0x118/0x178
[ 1523.223178]  krealloc_noprof+0x128/0x360
[ 1523.223209]  krealloc_less_oob_helper+0x168/0xc50
[ 1523.223242]  krealloc_less_oob+0x20/0x38
[ 1523.223271]  kunit_try_run_case+0x170/0x3f0
[ 1523.223302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.223339]  kthread+0x328/0x630
[ 1523.223362]  ret_from_fork+0x10/0x20
[ 1523.223390] 
[ 1523.223400] The buggy address belongs to the object at ffff000800d21000
[ 1523.223400]  which belongs to the cache kmalloc-256 of size 256
[ 1523.223437] The buggy address is located 0 bytes to the right of
[ 1523.223437]  allocated 201-byte region [ffff000800d21000, ffff000800d210c9)
[ 1523.223480] 
[ 1523.223489] The buggy address belongs to the physical page:
[ 1523.223506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20
[ 1523.223539] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 1523.223569] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 1523.223601] page_type: f5(slab)
[ 1523.223627] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.223661] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.223697] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.223731] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.223766] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff
[ 1523.223800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[ 1523.223825] page dumped because: kasan: bad access detected
[ 1523.223843] 
[ 1523.223852] Memory state around the buggy address:
[ 1523.223871]  ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.223900]  ffff000800d21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1523.223929] >ffff000800d21080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 1523.223952]                                               ^
[ 1523.223974]  ffff000800d21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.224003]  ffff000800d21180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.224027] ==================================================================
[ 1523.224083] ==================================================================
[ 1523.224106] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[ 1523.224141] Write of size 1 at addr ffff000800d210d0 by task kunit_try_catch/229
[ 1523.224173] 
[ 1523.224187] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.224245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.224263] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.224283] Call trace:
[ 1523.224295]  show_stack+0x20/0x38 (C)
[ 1523.224330]  dump_stack_lvl+0x8c/0xd0
[ 1523.224368]  print_report+0x118/0x608
[ 1523.224407]  kasan_report+0xdc/0x128
[ 1523.224445]  __asan_report_store1_noabort+0x20/0x30
[ 1523.224481]  krealloc_less_oob_helper+0xb9c/0xc50
[ 1523.224520]  krealloc_less_oob+0x20/0x38
[ 1523.224557]  kunit_try_run_case+0x170/0x3f0
[ 1523.224594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.224639]  kthread+0x328/0x630
[ 1523.224669]  ret_from_fork+0x10/0x20
[ 1523.224704] 
[ 1523.224713] Allocated by task 229:
[ 1523.224729]  kasan_save_stack+0x3c/0x68
[ 1523.224762]  kasan_save_track+0x20/0x40
[ 1523.224793]  kasan_save_alloc_info+0x40/0x58
[ 1523.224820]  __kasan_krealloc+0x118/0x178
[ 1523.224852]  krealloc_noprof+0x128/0x360
[ 1523.224883]  krealloc_less_oob_helper+0x168/0xc50
[ 1523.224915]  krealloc_less_oob+0x20/0x38
[ 1523.224945]  kunit_try_run_case+0x170/0x3f0
[ 1523.224975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.225012]  kthread+0x328/0x630
[ 1523.225035]  ret_from_fork+0x10/0x20
[ 1523.225064] 
[ 1523.225073] The buggy address belongs to the object at ffff000800d21000
[ 1523.225073]  which belongs to the cache kmalloc-256 of size 256
[ 1523.225110] The buggy address is located 7 bytes to the right of
[ 1523.225110]  allocated 201-byte region [ffff000800d21000, ffff000800d210c9)
[ 1523.225153] 
[ 1523.225162] The buggy address belongs to the physical page:
[ 1523.225180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20
[ 1523.225212] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 1523.225242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 1523.225274] page_type: f5(slab)
[ 1523.225299] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.225333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.225369] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.225403] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.225438] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff
[ 1523.225472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[ 1523.225498] page dumped because: kasan: bad access detected
[ 1523.225516] 
[ 1523.225524] Memory state around the buggy address:
[ 1523.225543]  ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.225572]  ffff000800d21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1523.225601] >ffff000800d21080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 1523.225625]                                                  ^
[ 1523.225647]  ffff000800d21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.225676]  ffff000800d21180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.225700] ==================================================================
[ 1523.225726] ==================================================================
[ 1523.225747] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[ 1523.225781] Write of size 1 at addr ffff000800d210da by task kunit_try_catch/229
[ 1523.225813] 
[ 1523.225827] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.225884] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.225902] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.225922] Call trace:
[ 1523.225933]  show_stack+0x20/0x38 (C)
[ 1523.225968]  dump_stack_lvl+0x8c/0xd0
[ 1523.226006]  print_report+0x118/0x608
[ 1523.226045]  kasan_report+0xdc/0x128
[ 1523.226084]  __asan_report_store1_noabort+0x20/0x30
[ 1523.226120]  krealloc_less_oob_helper+0xa80/0xc50
[ 1523.226159]  krealloc_less_oob+0x20/0x38
[ 1523.226195]  kunit_try_run_case+0x170/0x3f0
[ 1523.226232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.226276]  kthread+0x328/0x630
[ 1523.226306]  ret_from_fork+0x10/0x20
[ 1523.226342] 
[ 1523.226351] Allocated by task 229:
[ 1523.226367]  kasan_save_stack+0x3c/0x68
[ 1523.226399]  kasan_save_track+0x20/0x40
[ 1523.226430]  kasan_save_alloc_info+0x40/0x58
[ 1523.226457]  __kasan_krealloc+0x118/0x178
[ 1523.226489]  krealloc_noprof+0x128/0x360
[ 1523.226520]  krealloc_less_oob_helper+0x168/0xc50
[ 1523.226553]  krealloc_less_oob+0x20/0x38
[ 1523.226582]  kunit_try_run_case+0x170/0x3f0
[ 1523.226613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.226650]  kthread+0x328/0x630
[ 1523.226673]  ret_from_fork+0x10/0x20
[ 1523.226702] 
[ 1523.226711] The buggy address belongs to the object at ffff000800d21000
[ 1523.226711]  which belongs to the cache kmalloc-256 of size 256
[ 1523.226748] The buggy address is located 17 bytes to the right of
[ 1523.226748]  allocated 201-byte region [ffff000800d21000, ffff000800d210c9)
[ 1523.226792] 
[ 1523.226801] The buggy address belongs to the physical page:
[ 1523.226818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20
[ 1523.226851] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 1523.226881] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 1523.226913] page_type: f5(slab)
[ 1523.227419] Write of size 1 at addr ffff000800d210ea by task kunit_try_catch/229
[ 1523.229260]  show_stack+0x20/0x38 (C)
[ 1523.233303] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.234288]  ffff000827892180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 1523.240058] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[ 1523.246582] 
[ 1523.251060]  kunit_try_run_case+0x170/0x3f0
[ 1523.257650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.273799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1523.289321]  kunit_try_run_case+0x170/0x3f0
[ 1523.297919] The buggy address belongs to the object at ffff000827f2f300
[ 1523.297919]  which belongs to the cache kmalloc-128 of size 128
[ 1525.271958] The buggy address belongs to the object at ffff000800c03c00
[ 1525.271958]  which belongs to the cache kmalloc-128 of size 128
[ 1525.315974] The buggy address is located 1 bytes inside of
[ 1525.315974]  128-byte region [ffff000827998100, ffff000827998180)
[ 1525.341573] Read of size 1 at addr ffff000827f466d0 by task kunit_try_catch/330
[ 1525.361931] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[ 1525.391784] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 1557.396266] ==================================================================
[ 1557.396289] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[ 1557.396289] 
[ 1557.396322] Use-after-free read at 0x00000000d0001b62 (in kfence-#95):
[ 1557.396337]  test_krealloc+0x51c/0x830
[ 1557.396354]  kunit_try_run_case+0x170/0x3f0
[ 1557.396370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1557.396387]  kthread+0x328/0x630
[ 1557.396398]  ret_from_fork+0x10/0x20
[ 1557.396412] 
[ 1557.396418] kfence-#95: 0x00000000d0001b62-0x0000000066128209, size=32, cache=kmalloc-32
[ 1557.396418] 
[ 1557.396435] allocated by task 408 on cpu 1 at 1557.396214s (0.000219s ago):
[ 1557.396461]  test_alloc+0x29c/0x628
[ 1557.396475]  test_krealloc+0xc0/0x830
[ 1557.396488]  kunit_try_run_case+0x170/0x3f0
[ 1557.396501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1557.396517]  kthread+0x328/0x630
[ 1557.396526]  ret_from_fork+0x10/0x20
[ 1557.396539] 
[ 1557.396544] freed by task 408 on cpu 1 at 1557.396231s (0.000312s ago):
[ 1557.396568]  krealloc_noprof+0x148/0x360
[ 1557.396582]  test_krealloc+0x1dc/0x830
[ 1557.396596]  kunit_try_run_case+0x170/0x3f0
[ 1557.396609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1557.396624]  kthread+0x328/0x630
[ 1557.396634]  ret_from_fork+0x10/0x20
[ 1557.396647] 
[ 1557.396657] CPU: 1 UID: 0 PID: 408 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1557.396685] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1557.396694] Hardware name: ARM Juno development board (r2) (DT)
[ 1557.396704] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[ 1568.648093] Internal error: Oops: 0000000096000005 [#1]  SMP
[ 1568.651608] amba 20010000.etf: deferred probe timeout, ignoring dependency
[ 1568.651720] amba 20030000.tpiu: deferred probe timeout, ignoring dependency
[ 1568.651828] amba 20040000.funnel: deferred probe timeout, ignoring dependency
[ 1568.651934] amba 20070000.etr: deferred probe timeout, ignoring dependency
[ 1568.652077] amba 20100000.stm: deferred probe timeout, ignoring dependency
[ 1568.652188] amba 20120000.replicator: deferred probe timeout, ignoring dependency
[ 1568.652309] amba 22010000.cpu-debug: deferred probe timeout, ignoring dependency
[ 1568.652415] amba 22040000.etm: deferred probe timeout, ignoring dependency
[ 1568.652520] amba 22020000.cti: deferred probe timeout, ignoring dependency
[ 1568.652626] amba 220c0000.funnel: deferred probe timeout, ignoring dependency
[ 1568.652731] amba 22110000.cpu-debug: deferred probe timeout, ignoring dependency
[ 1568.652836] amba 22140000.etm: deferred probe timeout, ignoring dependency
[ 1568.652940] amba 22120000.cti: deferred probe timeout, ignoring dependency
[ 1568.653058] amba 23010000.cpu-debug: deferred probe timeout, ignoring dependency
[ 1568.653164] amba 23040000.etm: deferred probe timeout, ignoring dependency
[ 1568.653267] amba 23020000.cti: deferred probe timeout, ignoring dependency
[ 1568.653374] amba 230c0000.funnel: deferred probe timeout, ignoring dependency
[ 1568.653478] amba 23110000.cpu-debug: deferred probe timeout, ignoring dependency
[ 1568.653583] amba 23140000.etm: deferred probe timeout, ignoring dependency
[ 1568.653687] amba 23120000.cti: deferred probe timeout, ignoring dependency
[ 1568.653801] amba 23210000.cpu-debug: deferred probe timeout, ignoring dependency
[ 1568.653906] amba 23240000.etm: deferred probe timeout, ignoring dependency
[ 1568.654011] amba 23220000.cti: deferred probe timeout, ignoring dependency
[ 1568.654116] amba 23310000.cpu-debug: deferred probe timeout, ignoring dependency
[ 1568.654230] amba 23340000.etm: deferred probe timeout, ignoring dependency
[ 1568.654334] amba 23320000.cti: deferred probe timeout, ignoring dependency
[ 1568.654438] amba 20020000.cti: deferred probe timeout, ignoring dependency
[ 1568.654541] amba 20110000.cti: deferred probe timeout, ignoring dependency
[ 1568.654656] amba 20130000.funnel: deferred probe timeout, ignoring dependency
[ 1568.654761] amba 20140000.etf: deferred probe timeout, ignoring dependency
[ 1568.654866] amba 20150000.funnel: deferred probe timeout, ignoring dependency
[ 1568.654970] amba 20160000.cti: deferred probe timeout, ignoring dependency
[ 1569.898880] Modules linked in:
[ 1569.901987] CPU: 0 UID: 0 PID: 603 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1569.913197] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1569.918280] Hardware name: ARM Juno development board (r2) (DT)
[ 1569.924235] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1569.931248] pc : kunit_test_null_dereference+0x70/0x170
[ 1569.936537] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1569.942427] sp : ffff80008a6f7d30
[ 1569.945769] x29: ffff80008a6f7d90 x28: 0000000000000000 x27: 0000000000000000
[ 1569.952992] x26: 1fffe0010443fc61 x25: 0000000000000000 x24: 0000000000000004
[ 1569.960211] x23: ffff0008221fe30c x22: ffff800081229ce8 x21: ffff0008016a4f88
[ 1569.967433] x20: 1ffff000114defa6 x19: ffff800087d07990 x18: 00000000c450c08d
[ 1569.974654] x17: ffff8000801fbf3c x16: ffff8000801fbc74 x15: ffff8000811ef080
[ 1569.981876] x14: ffff8000808f8724 x13: 1fffe00126bb4d89 x12: ffff600104c0311c
[ 1569.989099] x11: 1fffe00104c0311b x10: ffff600104c0311b x9 : ffff800081221478
[ 1569.996321] x8 : ffff80008a6f7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[ 1570.003541] x5 : ffff7000114defa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[ 1570.010761] x2 : dfff800000000000 x1 : ffff000826018000 x0 : ffff800087d07990
[ 1570.017982] Call trace:
[ 1570.020453]  kunit_test_null_dereference+0x70/0x170 (P)
[ 1570.025742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1570.031288]  kthread+0x328/0x630
[ 1570.034561]  ret_from_fork+0x10/0x20
[ 1570.038200] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[ 1570.044332] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 1557.124345] ==================================================================
[ 1557.124368] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[ 1557.124368] 
[ 1557.124402] Use-after-free read at 0x000000003456d764 (in kfence-#93):
[ 1557.124418]  test_memcache_typesafe_by_rcu+0x280/0x560
[ 1557.124436]  kunit_try_run_case+0x170/0x3f0
[ 1557.124452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1557.124469]  kthread+0x328/0x630
[ 1557.124480]  ret_from_fork+0x10/0x20
[ 1557.124495] 
[ 1557.124501] kfence-#93: 0x000000003456d764-0x0000000073d6ceb5, size=32, cache=test
[ 1557.124501] 
[ 1557.124516] allocated by task 406 on cpu 1 at 1557.084086s (0.040429s ago):
[ 1557.124541]  test_alloc+0x230/0x628
[ 1557.124555]  test_memcache_typesafe_by_rcu+0x15c/0x560
[ 1557.124571]  kunit_try_run_case+0x170/0x3f0
[ 1557.124585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1557.124600]  kthread+0x328/0x630
[ 1557.124610]  ret_from_fork+0x10/0x20
[ 1557.124622] 
[ 1557.124627] freed by task 406 on cpu 1 at 1557.084095s (0.040532s ago):
[ 1557.124649]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[ 1557.124665]  kunit_try_run_case+0x170/0x3f0
[ 1557.124679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1557.124694]  kthread+0x328/0x630
[ 1557.124704]  ret_from_fork+0x10/0x20
[ 1557.124717] 
[ 1557.124727] CPU: 2 UID: 0 PID: 406 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1557.124753] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1557.124761] Hardware name: ARM Juno development board (r2) (DT)
[ 1557.124771] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 1532.837607] ==================================================================
[ 1532.837639] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[ 1532.837639] 
[ 1532.837699] Invalid read at 0x0000000049ef3f7c:
[ 1532.837728]  test_invalid_access+0xdc/0x1f0
[ 1532.837768]  kunit_try_run_case+0x170/0x3f0
[ 1532.837808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1532.837851]  kthread+0x328/0x630
[ 1532.837882]  ret_from_fork+0x10/0x20
[ 1532.837919] 
[ 1532.837943] CPU: 3 UID: 0 PID: 402 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1532.838004] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1532.838027] Hardware name: ARM Juno development board (r2) (DT)
[ 1532.838052] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 1532.584159] ==================================================================
[ 1532.584176] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[ 1532.584176] 
[ 1532.584198] Corrupted memory at 0x000000007233c1f2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#89):
[ 1532.584268]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[ 1532.584286]  kunit_try_run_case+0x170/0x3f0
[ 1532.584302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1532.584318]  kthread+0x328/0x630
[ 1532.584329]  ret_from_fork+0x10/0x20
[ 1532.584343] 
[ 1532.584349] kfence-#89: 0x00000000b4ce457b-0x00000000981974f8, size=73, cache=kmalloc-96
[ 1532.584349] 
[ 1532.584365] allocated by task 396 on cpu 2 at 1532.584114s (0.000250s ago):
[ 1532.584388]  test_alloc+0x29c/0x628
[ 1532.584401]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[ 1532.584416]  kunit_try_run_case+0x170/0x3f0
[ 1532.584430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1532.584445]  kthread+0x328/0x630
[ 1532.584454]  ret_from_fork+0x10/0x20
[ 1532.584467] 
[ 1532.584472] freed by task 396 on cpu 2 at 1532.584123s (0.000348s ago):
[ 1532.584494]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[ 1532.584510]  kunit_try_run_case+0x170/0x3f0
[ 1532.584523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1532.584538]  kthread+0x328/0x630
[ 1532.584548]  ret_from_fork+0x10/0x20
[ 1532.584560] 
[ 1532.584570] CPU: 2 UID: 0 PID: 396 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1532.584597] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1532.584605] Hardware name: ARM Juno development board (r2) (DT)
[ 1532.584615] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 1532.368327] ==================================================================
[ 1532.368344] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[ 1532.368344] 
[ 1532.368378] Out-of-bounds read at 0x00000000d36c7839 (105B right of kfence-#87):
[ 1532.368395]  test_kmalloc_aligned_oob_read+0x238/0x468
[ 1532.368414]  kunit_try_run_case+0x170/0x3f0
[ 1532.368430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1532.368447]  kthread+0x328/0x630
[ 1532.368458]  ret_from_fork+0x10/0x20
[ 1532.368472] 
[ 1532.368477] kfence-#87: 0x000000001e74634e-0x00000000849107ed, size=73, cache=kmalloc-96
[ 1532.368477] 
[ 1532.368494] allocated by task 394 on cpu 2 at 1532.368305s (0.000188s ago):
[ 1532.368519]  test_alloc+0x29c/0x628
[ 1532.368533]  test_kmalloc_aligned_oob_read+0x100/0x468
[ 1532.368548]  kunit_try_run_case+0x170/0x3f0
[ 1532.368562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1532.368577]  kthread+0x328/0x630
[ 1532.368586]  ret_from_fork+0x10/0x20
[ 1532.368599] 
[ 1532.368609] CPU: 2 UID: 0 PID: 394 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1532.368635] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1532.368644] Hardware name: ARM Juno development board (r2) (DT)
[ 1532.368653] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 1527.740544] ==================================================================
[ 1527.740558] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[ 1527.740558] 
[ 1527.740577] Corrupted memory at 0x000000006229cae2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#45):
[ 1527.740647]  test_corruption+0x278/0x378
[ 1527.740663]  kunit_try_run_case+0x170/0x3f0
[ 1527.740678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.740693]  kthread+0x328/0x630
[ 1527.740703]  ret_from_fork+0x10/0x20
[ 1527.740716] 
[ 1527.740721] kfence-#45: 0x00000000516f0b0f-0x00000000714b4d81, size=32, cache=kmalloc-32
[ 1527.740721] 
[ 1527.740737] allocated by task 382 on cpu 2 at 1527.740514s (0.000222s ago):
[ 1527.740759]  test_alloc+0x29c/0x628
[ 1527.740773]  test_corruption+0xdc/0x378
[ 1527.740787]  kunit_try_run_case+0x170/0x3f0
[ 1527.740800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.740815]  kthread+0x328/0x630
[ 1527.740825]  ret_from_fork+0x10/0x20
[ 1527.740837] 
[ 1527.740842] freed by task 382 on cpu 2 at 1527.740522s (0.000319s ago):
[ 1527.740865]  test_corruption+0x278/0x378
[ 1527.740879]  kunit_try_run_case+0x170/0x3f0
[ 1527.740892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.740907]  kthread+0x328/0x630
[ 1527.740916]  ret_from_fork+0x10/0x20
[ 1527.740928] 
[ 1527.740936] CPU: 2 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1527.740962] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1527.740970] Hardware name: ARM Juno development board (r2) (DT)
[ 1527.740979] ==================================================================
[ 1528.160154] ==================================================================
[ 1528.160166] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[ 1528.160166] 
[ 1528.160185] Corrupted memory at 0x000000002392782f [ ! ] (in kfence-#32):
[ 1528.160211]  test_corruption+0x1d8/0x378
[ 1528.160227]  kunit_try_run_case+0x170/0x3f0
[ 1528.160242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1528.160257]  kthread+0x328/0x630
[ 1528.160268]  ret_from_fork+0x10/0x20
[ 1528.160281] 
[ 1528.160287] kfence-#32: 0x00000000a438bee4-0x000000007c12f73c, size=32, cache=test
[ 1528.160287] 
[ 1528.160301] allocated by task 384 on cpu 2 at 1528.160118s (0.000182s ago):
[ 1528.160323]  test_alloc+0x230/0x628
[ 1528.160337]  test_corruption+0x198/0x378
[ 1528.160350]  kunit_try_run_case+0x170/0x3f0
[ 1528.160363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1528.160378]  kthread+0x328/0x630
[ 1528.160388]  ret_from_fork+0x10/0x20
[ 1528.160400] 
[ 1528.160405] freed by task 384 on cpu 2 at 1528.160126s (0.000278s ago):
[ 1528.160428]  test_corruption+0x1d8/0x378
[ 1528.160442]  kunit_try_run_case+0x170/0x3f0
[ 1528.160455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1528.160470]  kthread+0x328/0x630
[ 1528.160479]  ret_from_fork+0x10/0x20
[ 1528.160492] 
[ 1528.160499] CPU: 2 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1528.160524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1528.160532] Hardware name: ARM Juno development board (r2) (DT)
[ 1528.160541] ==================================================================
[ 1528.056262] ==================================================================
[ 1528.056276] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[ 1528.056276] 
[ 1528.056295] Corrupted memory at 0x00000000611fb4e2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#47):
[ 1528.056364]  test_corruption+0x120/0x378
[ 1528.056381]  kunit_try_run_case+0x170/0x3f0
[ 1528.056395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1528.056411]  kthread+0x328/0x630
[ 1528.056422]  ret_from_fork+0x10/0x20
[ 1528.056435] 
[ 1528.056441] kfence-#47: 0x000000002490e9ee-0x0000000076717044, size=32, cache=test
[ 1528.056441] 
[ 1528.056457] allocated by task 384 on cpu 2 at 1528.056227s (0.000229s ago):
[ 1528.056479]  test_alloc+0x230/0x628
[ 1528.056493]  test_corruption+0xdc/0x378
[ 1528.056507]  kunit_try_run_case+0x170/0x3f0
[ 1528.056520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1528.056535]  kthread+0x328/0x630
[ 1528.056545]  ret_from_fork+0x10/0x20
[ 1528.056557] 
[ 1528.056562] freed by task 384 on cpu 2 at 1528.056236s (0.000325s ago):
[ 1528.056586]  test_corruption+0x120/0x378
[ 1528.056600]  kunit_try_run_case+0x170/0x3f0
[ 1528.056613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1528.056628]  kthread+0x328/0x630
[ 1528.056638]  ret_from_fork+0x10/0x20
[ 1528.056650] 
[ 1528.056659] CPU: 2 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1528.056685] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1528.056693] Hardware name: ARM Juno development board (r2) (DT)
[ 1528.056702] ==================================================================
[ 1527.953616] ==================================================================
[ 1527.953633] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[ 1527.953633] 
[ 1527.953653] Corrupted memory at 0x0000000032ddad88 [ ! ] (in kfence-#2):
[ 1527.953679]  test_corruption+0x284/0x378
[ 1527.953695]  kunit_try_run_case+0x170/0x3f0
[ 1527.953711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.953726]  kthread+0x328/0x630
[ 1527.953738]  ret_from_fork+0x10/0x20
[ 1527.953752] 
[ 1527.953757] kfence-#2: 0x0000000082e54077-0x0000000070523a65, size=32, cache=kmalloc-32
[ 1527.953757] 
[ 1527.953772] allocated by task 382 on cpu 2 at 1527.953571s (0.000200s ago):
[ 1527.953794]  test_alloc+0x29c/0x628
[ 1527.953808]  test_corruption+0x198/0x378
[ 1527.953821]  kunit_try_run_case+0x170/0x3f0
[ 1527.953835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.953850]  kthread+0x328/0x630
[ 1527.953859]  ret_from_fork+0x10/0x20
[ 1527.953871] 
[ 1527.953876] freed by task 382 on cpu 2 at 1527.953579s (0.000295s ago):
[ 1527.953898]  test_corruption+0x284/0x378
[ 1527.953912]  kunit_try_run_case+0x170/0x3f0
[ 1527.953925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.953940]  kthread+0x328/0x630
[ 1527.953950]  ret_from_fork+0x10/0x20
[ 1527.953962] 
[ 1527.953972] CPU: 2 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1527.953997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1527.954005] Hardware name: ARM Juno development board (r2) (DT)
[ 1527.954014] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 1527.638983] ==================================================================
[ 1527.638998] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[ 1527.638998] 
[ 1527.639018] Invalid free of 0x000000007590cb6d (in kfence-#44):
[ 1527.639032]  test_invalid_addr_free+0xec/0x238
[ 1527.639048]  kunit_try_run_case+0x170/0x3f0
[ 1527.639064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.639080]  kthread+0x328/0x630
[ 1527.639090]  ret_from_fork+0x10/0x20
[ 1527.639104] 
[ 1527.639110] kfence-#44: 0x000000007ad76db6-0x00000000a3a9f3ef, size=32, cache=test
[ 1527.639110] 
[ 1527.639126] allocated by task 380 on cpu 2 at 1527.638955s (0.000170s ago):
[ 1527.639149]  test_alloc+0x230/0x628
[ 1527.639163]  test_invalid_addr_free+0xd4/0x238
[ 1527.639177]  kunit_try_run_case+0x170/0x3f0
[ 1527.639190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.639206]  kthread+0x328/0x630
[ 1527.639216]  ret_from_fork+0x10/0x20
[ 1527.639228] 
[ 1527.639237] CPU: 2 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1527.639263] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1527.639271] Hardware name: ARM Juno development board (r2) (DT)
[ 1527.639280] ==================================================================
[ 1527.532152] ==================================================================
[ 1527.532165] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[ 1527.532165] 
[ 1527.532184] Invalid free of 0x0000000012c7cbed (in kfence-#43):
[ 1527.532198]  test_invalid_addr_free+0x1ac/0x238
[ 1527.532214]  kunit_try_run_case+0x170/0x3f0
[ 1527.532229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.532245]  kthread+0x328/0x630
[ 1527.532256]  ret_from_fork+0x10/0x20
[ 1527.532269] 
[ 1527.532275] kfence-#43: 0x000000003f7b4d01-0x0000000039e8cc35, size=32, cache=kmalloc-32
[ 1527.532275] 
[ 1527.532290] allocated by task 378 on cpu 2 at 1527.532129s (0.000160s ago):
[ 1527.532313]  test_alloc+0x29c/0x628
[ 1527.532327]  test_invalid_addr_free+0xd4/0x238
[ 1527.532341]  kunit_try_run_case+0x170/0x3f0
[ 1527.532354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.532370]  kthread+0x328/0x630
[ 1527.532379]  ret_from_fork+0x10/0x20
[ 1527.532392] 
[ 1527.532400] CPU: 2 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1527.532426] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1527.532433] Hardware name: ARM Juno development board (r2) (DT)
[ 1527.532442] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 1527.328164] ==================================================================
[ 1527.328178] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[ 1527.328178] 
[ 1527.328198] Invalid free of 0x00000000acaf80ad (in kfence-#41):
[ 1527.328213]  test_double_free+0x1bc/0x238
[ 1527.328230]  kunit_try_run_case+0x170/0x3f0
[ 1527.328246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.328261]  kthread+0x328/0x630
[ 1527.328273]  ret_from_fork+0x10/0x20
[ 1527.328287] 
[ 1527.328292] kfence-#41: 0x00000000acaf80ad-0x0000000070a0fc0b, size=32, cache=kmalloc-32
[ 1527.328292] 
[ 1527.328308] allocated by task 374 on cpu 2 at 1527.328122s (0.000184s ago):
[ 1527.328331]  test_alloc+0x29c/0x628
[ 1527.328345]  test_double_free+0xd4/0x238
[ 1527.328359]  kunit_try_run_case+0x170/0x3f0
[ 1527.328373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.328388]  kthread+0x328/0x630
[ 1527.328397]  ret_from_fork+0x10/0x20
[ 1527.328410] 
[ 1527.328415] freed by task 374 on cpu 2 at 1527.328131s (0.000283s ago):
[ 1527.328437]  test_double_free+0x1ac/0x238
[ 1527.328452]  kunit_try_run_case+0x170/0x3f0
[ 1527.328465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.328480]  kthread+0x328/0x630
[ 1527.328490]  ret_from_fork+0x10/0x20
[ 1527.328502] 
[ 1527.328511] CPU: 2 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1527.328537] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1527.328545] Hardware name: ARM Juno development board (r2) (DT)
[ 1527.328555] ==================================================================
[ 1527.428185] ==================================================================
[ 1527.428200] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[ 1527.428200] 
[ 1527.428220] Invalid free of 0x00000000112ceba9 (in kfence-#42):
[ 1527.428234]  test_double_free+0x100/0x238
[ 1527.428251]  kunit_try_run_case+0x170/0x3f0
[ 1527.428266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.428282]  kthread+0x328/0x630
[ 1527.428293]  ret_from_fork+0x10/0x20
[ 1527.428306] 
[ 1527.428312] kfence-#42: 0x00000000112ceba9-0x000000007a0c2341, size=32, cache=test
[ 1527.428312] 
[ 1527.428328] allocated by task 376 on cpu 2 at 1527.428145s (0.000182s ago):
[ 1527.428351]  test_alloc+0x230/0x628
[ 1527.428366]  test_double_free+0xd4/0x238
[ 1527.428380]  kunit_try_run_case+0x170/0x3f0
[ 1527.428393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.428409]  kthread+0x328/0x630
[ 1527.428419]  ret_from_fork+0x10/0x20
[ 1527.428431] 
[ 1527.428436] freed by task 376 on cpu 2 at 1527.428153s (0.000282s ago):
[ 1527.428460]  test_double_free+0xf0/0x238
[ 1527.428475]  kunit_try_run_case+0x170/0x3f0
[ 1527.428488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.428503]  kthread+0x328/0x630
[ 1527.428513]  ret_from_fork+0x10/0x20
[ 1527.428526] 
[ 1527.428534] CPU: 2 UID: 0 PID: 376 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1527.428560] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1527.428568] Hardware name: ARM Juno development board (r2) (DT)
[ 1527.428578] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 1526.904171] ==================================================================
[ 1526.904185] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[ 1526.904185] 
[ 1526.904211] Use-after-free read at 0x000000006fe7c169 (in kfence-#36):
[ 1526.904224]  test_use_after_free_read+0x114/0x248
[ 1526.904242]  kunit_try_run_case+0x170/0x3f0
[ 1526.904257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.904272]  kthread+0x328/0x630
[ 1526.904282]  ret_from_fork+0x10/0x20
[ 1526.904295] 
[ 1526.904301] kfence-#36: 0x000000006fe7c169-0x000000002600da61, size=32, cache=kmalloc-32
[ 1526.904301] 
[ 1526.904316] allocated by task 366 on cpu 2 at 1526.904146s (0.000170s ago):
[ 1526.904339]  test_alloc+0x29c/0x628
[ 1526.904353]  test_use_after_free_read+0xd0/0x248
[ 1526.904368]  kunit_try_run_case+0x170/0x3f0
[ 1526.904381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.904396]  kthread+0x328/0x630
[ 1526.904406]  ret_from_fork+0x10/0x20
[ 1526.904418] 
[ 1526.904423] freed by task 366 on cpu 2 at 1526.904153s (0.000268s ago):
[ 1526.904446]  test_use_after_free_read+0x1c0/0x248
[ 1526.904461]  kunit_try_run_case+0x170/0x3f0
[ 1526.904474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.904489]  kthread+0x328/0x630
[ 1526.904498]  ret_from_fork+0x10/0x20
[ 1526.904511] 
[ 1526.904518] CPU: 2 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1526.904544] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1526.904551] Hardware name: ARM Juno development board (r2) (DT)
[ 1526.904560] ==================================================================
[ 1527.008144] ==================================================================
[ 1527.008159] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[ 1527.008159] 
[ 1527.008187] Use-after-free read at 0x00000000187f2aa1 (in kfence-#37):
[ 1527.008202]  test_use_after_free_read+0x114/0x248
[ 1527.008218]  kunit_try_run_case+0x170/0x3f0
[ 1527.008233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.008249]  kthread+0x328/0x630
[ 1527.008259]  ret_from_fork+0x10/0x20
[ 1527.008273] 
[ 1527.008279] kfence-#37: 0x00000000187f2aa1-0x000000003fb99b1b, size=32, cache=test
[ 1527.008279] 
[ 1527.008294] allocated by task 368 on cpu 2 at 1527.008116s (0.000177s ago):
[ 1527.008318]  test_alloc+0x230/0x628
[ 1527.008332]  test_use_after_free_read+0xd0/0x248
[ 1527.008346]  kunit_try_run_case+0x170/0x3f0
[ 1527.008359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.008374]  kthread+0x328/0x630
[ 1527.008384]  ret_from_fork+0x10/0x20
[ 1527.008396] 
[ 1527.008401] freed by task 368 on cpu 2 at 1527.008124s (0.000275s ago):
[ 1527.008424]  test_use_after_free_read+0xf0/0x248
[ 1527.008439]  kunit_try_run_case+0x170/0x3f0
[ 1527.008451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1527.008466]  kthread+0x328/0x630
[ 1527.008476]  ret_from_fork+0x10/0x20
[ 1527.008488] 
[ 1527.008497] CPU: 2 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1527.008523] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1527.008531] Hardware name: ARM Juno development board (r2) (DT)
[ 1527.008541] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 1526.692161] ==================================================================
[ 1526.692182] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[ 1526.692182] 
[ 1526.692215] Out-of-bounds write at 0x00000000d6fddde9 (1B left of kfence-#34):
[ 1526.692232]  test_out_of_bounds_write+0x100/0x240
[ 1526.692250]  kunit_try_run_case+0x170/0x3f0
[ 1526.692265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.692282]  kthread+0x328/0x630
[ 1526.692293]  ret_from_fork+0x10/0x20
[ 1526.692308] 
[ 1526.692314] kfence-#34: 0x00000000fb601f2e-0x00000000d780c8a6, size=32, cache=kmalloc-32
[ 1526.692314] 
[ 1526.692330] allocated by task 362 on cpu 2 at 1526.692139s (0.000190s ago):
[ 1526.692356]  test_alloc+0x29c/0x628
[ 1526.692371]  test_out_of_bounds_write+0xc8/0x240
[ 1526.692385]  kunit_try_run_case+0x170/0x3f0
[ 1526.692399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.692414]  kthread+0x328/0x630
[ 1526.692423]  ret_from_fork+0x10/0x20
[ 1526.692436] 
[ 1526.692446] CPU: 2 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1526.692473] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1526.692480] Hardware name: ARM Juno development board (r2) (DT)
[ 1526.692490] ==================================================================
[ 1526.797283] ==================================================================
[ 1526.797298] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[ 1526.797298] 
[ 1526.797327] Out-of-bounds write at 0x00000000fe9e8847 (1B left of kfence-#35):
[ 1526.797345]  test_out_of_bounds_write+0x100/0x240
[ 1526.797363]  kunit_try_run_case+0x170/0x3f0
[ 1526.797378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.797394]  kthread+0x328/0x630
[ 1526.797405]  ret_from_fork+0x10/0x20
[ 1526.797418] 
[ 1526.797424] kfence-#35: 0x000000007f8b20a9-0x00000000669426b3, size=32, cache=test
[ 1526.797424] 
[ 1526.797440] allocated by task 364 on cpu 2 at 1526.797265s (0.000174s ago):
[ 1526.797465]  test_alloc+0x230/0x628
[ 1526.797479]  test_out_of_bounds_write+0xc8/0x240
[ 1526.797494]  kunit_try_run_case+0x170/0x3f0
[ 1526.797507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.797522]  kthread+0x328/0x630
[ 1526.797532]  ret_from_fork+0x10/0x20
[ 1526.797545] 
[ 1526.797554] CPU: 2 UID: 0 PID: 364 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1526.797580] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1526.797588] Hardware name: ARM Juno development board (r2) (DT)
[ 1526.797598] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 1526.487258] ==================================================================
[ 1526.487276] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[ 1526.487276] 
[ 1526.487306] Out-of-bounds read at 0x00000000523f7b63 (32B right of kfence-#31):
[ 1526.487323]  test_out_of_bounds_read+0x1c8/0x3e0
[ 1526.487339]  kunit_try_run_case+0x170/0x3f0
[ 1526.487355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.487371]  kthread+0x328/0x630
[ 1526.487382]  ret_from_fork+0x10/0x20
[ 1526.487396] 
[ 1526.487401] kfence-#31: 0x0000000001cf8d90-0x00000000b4c5772c, size=32, cache=test
[ 1526.487401] 
[ 1526.487417] allocated by task 360 on cpu 2 at 1526.487238s (0.000177s ago):
[ 1526.487441]  test_alloc+0x230/0x628
[ 1526.487455]  test_out_of_bounds_read+0x198/0x3e0
[ 1526.487470]  kunit_try_run_case+0x170/0x3f0
[ 1526.487483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.487498]  kthread+0x328/0x630
[ 1526.487507]  ret_from_fork+0x10/0x20
[ 1526.487520] 
[ 1526.487530] CPU: 2 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1526.487555] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1526.487563] Hardware name: ARM Juno development board (r2) (DT)
[ 1526.487573] ==================================================================
[ 1525.540173] ==================================================================
[ 1525.540202] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[ 1525.540202] 
[ 1525.540257] Out-of-bounds read at 0x00000000f4ce04cc (1B left of kfence-#6):
[ 1525.540291]  test_out_of_bounds_read+0x114/0x3e0
[ 1525.540329]  kunit_try_run_case+0x170/0x3f0
[ 1525.540363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.540402]  kthread+0x328/0x630
[ 1525.540428]  ret_from_fork+0x10/0x20
[ 1525.540460] 
[ 1525.540473] kfence-#6: 0x00000000d7b483ff-0x00000000077883c2, size=32, cache=kmalloc-32
[ 1525.540473] 
[ 1525.540507] allocated by task 358 on cpu 0 at 1525.540136s (0.000369s ago):
[ 1525.540558]  test_alloc+0x29c/0x628
[ 1525.540590]  test_out_of_bounds_read+0xdc/0x3e0
[ 1525.540625]  kunit_try_run_case+0x170/0x3f0
[ 1525.540656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.540694]  kthread+0x328/0x630
[ 1525.540718]  ret_from_fork+0x10/0x20
[ 1525.540747] 
[ 1525.540765] CPU: 0 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.540819] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.540838] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.540859] ==================================================================
[ 1526.168379] ==================================================================
[ 1526.168399] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[ 1526.168399] 
[ 1526.168431] Out-of-bounds read at 0x00000000d5c9cd98 (1B left of kfence-#20):
[ 1526.168448]  test_out_of_bounds_read+0x114/0x3e0
[ 1526.168465]  kunit_try_run_case+0x170/0x3f0
[ 1526.168481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.168497]  kthread+0x328/0x630
[ 1526.168508]  ret_from_fork+0x10/0x20
[ 1526.168522] 
[ 1526.168528] kfence-#20: 0x00000000c92d846a-0x00000000d8fe91ed, size=32, cache=test
[ 1526.168528] 
[ 1526.168544] allocated by task 360 on cpu 2 at 1526.168358s (0.000185s ago):
[ 1526.168569]  test_alloc+0x230/0x628
[ 1526.168583]  test_out_of_bounds_read+0xdc/0x3e0
[ 1526.168598]  kunit_try_run_case+0x170/0x3f0
[ 1526.168610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1526.168626]  kthread+0x328/0x630
[ 1526.168635]  ret_from_fork+0x10/0x20
[ 1526.168648] 
[ 1526.168658] CPU: 2 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1526.168684] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1526.168692] Hardware name: ARM Juno development board (r2) (DT)
[ 1526.168702] ==================================================================
[ 1525.752128] ==================================================================
[ 1525.752144] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[ 1525.752144] 
[ 1525.752173] Out-of-bounds read at 0x00000000220a224c (32B right of kfence-#14):
[ 1525.752190]  test_out_of_bounds_read+0x1c8/0x3e0
[ 1525.752207]  kunit_try_run_case+0x170/0x3f0
[ 1525.752222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.752238]  kthread+0x328/0x630
[ 1525.752249]  ret_from_fork+0x10/0x20
[ 1525.752263] 
[ 1525.752268] kfence-#14: 0x00000000b1cb7f10-0x0000000020860be1, size=32, cache=kmalloc-32
[ 1525.752268] 
[ 1525.752284] allocated by task 358 on cpu 2 at 1525.752108s (0.000174s ago):
[ 1525.752309]  test_alloc+0x29c/0x628
[ 1525.752322]  test_out_of_bounds_read+0x198/0x3e0
[ 1525.752337]  kunit_try_run_case+0x170/0x3f0
[ 1525.752350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.752365]  kthread+0x328/0x630
[ 1525.752375]  ret_from_fork+0x10/0x20
[ 1525.752387] 
[ 1525.752397] CPU: 2 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.752422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.752430] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.752440] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 1525.470259] ==================================================================
[ 1525.470283] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[ 1525.470317] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.470352] 
[ 1525.470367] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.470429] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.470449] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.470471] Call trace:
[ 1525.470483]  show_stack+0x20/0x38 (C)
[ 1525.470520]  dump_stack_lvl+0x8c/0xd0
[ 1525.470560]  print_report+0x118/0x608
[ 1525.470601]  kasan_report+0xdc/0x128
[ 1525.470642]  kasan_check_range+0x100/0x1a8
[ 1525.470684]  __kasan_check_write+0x20/0x30
[ 1525.470721]  strncpy_from_user+0x3c/0x2a0
[ 1525.470758]  copy_user_test_oob+0x5c0/0xec8
[ 1525.470800]  kunit_try_run_case+0x170/0x3f0
[ 1525.470839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.470885]  kthread+0x328/0x630
[ 1525.470917]  ret_from_fork+0x10/0x20
[ 1525.470955] 
[ 1525.470965] Allocated by task 356:
[ 1525.470983]  kasan_save_stack+0x3c/0x68
[ 1525.471017]  kasan_save_track+0x20/0x40
[ 1525.471050]  kasan_save_alloc_info+0x40/0x58
[ 1525.471079]  __kasan_kmalloc+0xd4/0xd8
[ 1525.471112]  __kmalloc_noprof+0x198/0x4c8
[ 1525.471145]  kunit_kmalloc_array+0x34/0x88
[ 1525.471177]  copy_user_test_oob+0xac/0xec8
[ 1525.471209]  kunit_try_run_case+0x170/0x3f0
[ 1525.471242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.471280]  kthread+0x328/0x630
[ 1525.471304]  ret_from_fork+0x10/0x20
[ 1525.471335] 
[ 1525.471346] The buggy address belongs to the object at ffff000827f2f500
[ 1525.471346]  which belongs to the cache kmalloc-128 of size 128
[ 1525.471385] The buggy address is located 0 bytes inside of
[ 1525.471385]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.471430] 
[ 1525.471440] The buggy address belongs to the physical page:
[ 1525.471458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.471493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.471525] page_type: f5(slab)
[ 1525.471552] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.471588] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.471615] page dumped because: kasan: bad access detected
[ 1525.471635] 
[ 1525.471644] Memory state around the buggy address:
[ 1525.471665]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.471695]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.471726] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.471751]                                                                 ^
[ 1525.471779]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.471809]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.471835] ==================================================================
[ 1525.471864] ==================================================================
[ 1525.471886] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[ 1525.471920] Write of size 1 at addr ffff000827f2f578 by task kunit_try_catch/356
[ 1525.471955] 
[ 1525.471970] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.472031] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.472051] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.472073] Call trace:
[ 1525.472085]  show_stack+0x20/0x38 (C)
[ 1525.472122]  dump_stack_lvl+0x8c/0xd0
[ 1525.472162]  print_report+0x118/0x608
[ 1525.472204]  kasan_report+0xdc/0x128
[ 1525.472244]  __asan_report_store1_noabort+0x20/0x30
[ 1525.472282]  strncpy_from_user+0x270/0x2a0
[ 1525.472320]  copy_user_test_oob+0x5c0/0xec8
[ 1525.472361]  kunit_try_run_case+0x170/0x3f0
[ 1525.472400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.472447]  kthread+0x328/0x630
[ 1525.472479]  ret_from_fork+0x10/0x20
[ 1525.472516] 
[ 1525.472527] Allocated by task 356:
[ 1525.472545]  kasan_save_stack+0x3c/0x68
[ 1525.472579]  kasan_save_track+0x20/0x40
[ 1525.472612]  kasan_save_alloc_info+0x40/0x58
[ 1525.472641]  __kasan_kmalloc+0xd4/0xd8
[ 1525.472674]  __kmalloc_noprof+0x198/0x4c8
[ 1525.472707]  kunit_kmalloc_array+0x34/0x88
[ 1525.472738]  copy_user_test_oob+0xac/0xec8
[ 1525.472771]  kunit_try_run_case+0x170/0x3f0
[ 1525.472803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.472841]  kthread+0x328/0x630
[ 1525.472865]  ret_from_fork+0x10/0x20
[ 1525.472896] 
[ 1525.472906] The buggy address belongs to the object at ffff000827f2f500
[ 1525.472906]  which belongs to the cache kmalloc-128 of size 128
[ 1525.472946] The buggy address is located 0 bytes to the right of
[ 1525.472946]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.472992] 
[ 1525.473002] The buggy address belongs to the physical page:
[ 1525.473021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.473056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.473088] page_type: f5(slab)
[ 1525.473114] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.473150] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.473178] page dumped because: kasan: bad access detected
[ 1525.473197] 
[ 1525.473207] Memory state around the buggy address:
[ 1525.473228]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.473258]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.473289] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.473314]                                                                 ^
[ 1525.473341]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.473372]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.473398] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 1525.467090] ==================================================================
[ 1525.467113] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[ 1525.467150] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.467183] 
[ 1525.467198] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.467259] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.467279] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.467302] Call trace:
[ 1525.467314]  show_stack+0x20/0x38 (C)
[ 1525.467351]  dump_stack_lvl+0x8c/0xd0
[ 1525.467390]  print_report+0x118/0x608
[ 1525.467431]  kasan_report+0xdc/0x128
[ 1525.467471]  kasan_check_range+0x100/0x1a8
[ 1525.467514]  __kasan_check_write+0x20/0x30
[ 1525.467550]  copy_user_test_oob+0x434/0xec8
[ 1525.467589]  kunit_try_run_case+0x170/0x3f0
[ 1525.467629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.467676]  kthread+0x328/0x630
[ 1525.467708]  ret_from_fork+0x10/0x20
[ 1525.467745] 
[ 1525.467755] Allocated by task 356:
[ 1525.467773]  kasan_save_stack+0x3c/0x68
[ 1525.467808]  kasan_save_track+0x20/0x40
[ 1525.467842]  kasan_save_alloc_info+0x40/0x58
[ 1525.467871]  __kasan_kmalloc+0xd4/0xd8
[ 1525.467904]  __kmalloc_noprof+0x198/0x4c8
[ 1525.467937]  kunit_kmalloc_array+0x34/0x88
[ 1525.467968]  copy_user_test_oob+0xac/0xec8
[ 1525.468002]  kunit_try_run_case+0x170/0x3f0
[ 1525.468034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.468074]  kthread+0x328/0x630
[ 1525.468098]  ret_from_fork+0x10/0x20
[ 1525.468127] 
[ 1525.468138] The buggy address belongs to the object at ffff000827f2f500
[ 1525.468138]  which belongs to the cache kmalloc-128 of size 128
[ 1525.468177] The buggy address is located 0 bytes inside of
[ 1525.468177]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.468221] 
[ 1525.468232] The buggy address belongs to the physical page:
[ 1525.468251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.468286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.468317] page_type: f5(slab)
[ 1525.468344] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.468380] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.468408] page dumped because: kasan: bad access detected
[ 1525.468427] 
[ 1525.468437] Memory state around the buggy address:
[ 1525.468457]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.468488]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.468519] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.468545]                                                                 ^
[ 1525.468572]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.468603]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.468629] ==================================================================
[ 1525.468686] ==================================================================
[ 1525.468712] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[ 1525.468748] Read of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.468783] 
[ 1525.468798] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.468859] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.468879] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.468902] Call trace:
[ 1525.468914]  show_stack+0x20/0x38 (C)
[ 1525.468952]  dump_stack_lvl+0x8c/0xd0
[ 1525.468991]  print_report+0x118/0x608
[ 1525.469031]  kasan_report+0xdc/0x128
[ 1525.469072]  kasan_check_range+0x100/0x1a8
[ 1525.469115]  __kasan_check_read+0x20/0x30
[ 1525.469150]  copy_user_test_oob+0x4a0/0xec8
[ 1525.469191]  kunit_try_run_case+0x170/0x3f0
[ 1525.469231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.469278]  kthread+0x328/0x630
[ 1525.469309]  ret_from_fork+0x10/0x20
[ 1525.469346] 
[ 1525.469357] Allocated by task 356:
[ 1525.469375]  kasan_save_stack+0x3c/0x68
[ 1525.469410]  kasan_save_track+0x20/0x40
[ 1525.469442]  kasan_save_alloc_info+0x40/0x58
[ 1525.469471]  __kasan_kmalloc+0xd4/0xd8
[ 1525.469503]  __kmalloc_noprof+0x198/0x4c8
[ 1525.469536]  kunit_kmalloc_array+0x34/0x88
[ 1525.469568]  copy_user_test_oob+0xac/0xec8
[ 1525.469602]  kunit_try_run_case+0x170/0x3f0
[ 1525.469635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.469673]  kthread+0x328/0x630
[ 1525.469697]  ret_from_fork+0x10/0x20
[ 1525.469727] 
[ 1525.469738] The buggy address belongs to the object at ffff000827f2f500
[ 1525.469738]  which belongs to the cache kmalloc-128 of size 128
[ 1525.469778] The buggy address is located 0 bytes inside of
[ 1525.469778]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.469822] 
[ 1525.469833] The buggy address belongs to the physical page:
[ 1525.469851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.469886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.469918] page_type: f5(slab)
[ 1525.469944] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.469981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.470008] page dumped because: kasan: bad access detected
[ 1525.470028] 
[ 1525.470038] Memory state around the buggy address:
[ 1525.470059]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.470090]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.470120] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.470146]                                                                 ^
[ 1525.470173]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.470203]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.470229] ==================================================================
[ 1525.465519] ==================================================================
[ 1525.465545] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[ 1525.465582] Read of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.465617] 
[ 1525.465632] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.465692] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.465712] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.465734] Call trace:
[ 1525.465747]  show_stack+0x20/0x38 (C)
[ 1525.465784]  dump_stack_lvl+0x8c/0xd0
[ 1525.465824]  print_report+0x118/0x608
[ 1525.465865]  kasan_report+0xdc/0x128
[ 1525.465904]  kasan_check_range+0x100/0x1a8
[ 1525.465948]  __kasan_check_read+0x20/0x30
[ 1525.465983]  copy_user_test_oob+0x3c8/0xec8
[ 1525.466023]  kunit_try_run_case+0x170/0x3f0
[ 1525.466063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.466109]  kthread+0x328/0x630
[ 1525.466141]  ret_from_fork+0x10/0x20
[ 1525.466179] 
[ 1525.466190] Allocated by task 356:
[ 1525.466208]  kasan_save_stack+0x3c/0x68
[ 1525.466242]  kasan_save_track+0x20/0x40
[ 1525.466275]  kasan_save_alloc_info+0x40/0x58
[ 1525.466304]  __kasan_kmalloc+0xd4/0xd8
[ 1525.466335]  __kmalloc_noprof+0x198/0x4c8
[ 1525.466369]  kunit_kmalloc_array+0x34/0x88
[ 1525.466401]  copy_user_test_oob+0xac/0xec8
[ 1525.466435]  kunit_try_run_case+0x170/0x3f0
[ 1525.466467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.466507]  kthread+0x328/0x630
[ 1525.466532]  ret_from_fork+0x10/0x20
[ 1525.466562] 
[ 1525.466572] The buggy address belongs to the object at ffff000827f2f500
[ 1525.466572]  which belongs to the cache kmalloc-128 of size 128
[ 1525.466611] The buggy address is located 0 bytes inside of
[ 1525.466611]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.466655] 
[ 1525.466666] The buggy address belongs to the physical page:
[ 1525.466684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.466720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.466751] page_type: f5(slab)
[ 1525.466777] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.466813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.466841] page dumped because: kasan: bad access detected
[ 1525.466862] 
[ 1525.466872] Memory state around the buggy address:
[ 1525.466891]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.466922]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.466952] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.466978]                                                                 ^
[ 1525.467006]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.467036]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.467062] ==================================================================
[ 1525.460458] ==================================================================
[ 1525.460487] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[ 1525.460527] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.460562] 
[ 1525.460577] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.460638] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.460658] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.460681] Call trace:
[ 1525.460693]  show_stack+0x20/0x38 (C)
[ 1525.460732]  dump_stack_lvl+0x8c/0xd0
[ 1525.460772]  print_report+0x118/0x608
[ 1525.460814]  kasan_report+0xdc/0x128
[ 1525.460854]  kasan_check_range+0x100/0x1a8
[ 1525.460898]  __kasan_check_write+0x20/0x30
[ 1525.460933]  copy_user_test_oob+0x234/0xec8
[ 1525.460973]  kunit_try_run_case+0x170/0x3f0
[ 1525.461013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.461060]  kthread+0x328/0x630
[ 1525.461092]  ret_from_fork+0x10/0x20
[ 1525.461131] 
[ 1525.461142] Allocated by task 356:
[ 1525.461160]  kasan_save_stack+0x3c/0x68
[ 1525.461196]  kasan_save_track+0x20/0x40
[ 1525.461229]  kasan_save_alloc_info+0x40/0x58
[ 1525.461258]  __kasan_kmalloc+0xd4/0xd8
[ 1525.461291]  __kmalloc_noprof+0x198/0x4c8
[ 1525.461324]  kunit_kmalloc_array+0x34/0x88
[ 1525.461357]  copy_user_test_oob+0xac/0xec8
[ 1525.461390]  kunit_try_run_case+0x170/0x3f0
[ 1525.461422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.461462]  kthread+0x328/0x630
[ 1525.461486]  ret_from_fork+0x10/0x20
[ 1525.461517] 
[ 1525.461528] The buggy address belongs to the object at ffff000827f2f500
[ 1525.461528]  which belongs to the cache kmalloc-128 of size 128
[ 1525.461568] The buggy address is located 0 bytes inside of
[ 1525.461568]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.461611] 
[ 1525.461621] The buggy address belongs to the physical page:
[ 1525.461641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.461676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.461709] page_type: f5(slab)
[ 1525.461735] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.461772] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.461799] page dumped because: kasan: bad access detected
[ 1525.461819] 
[ 1525.461829] Memory state around the buggy address:
[ 1525.461850]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.461881]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.461911] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.461937]                                                                 ^
[ 1525.461964]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.461995]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.462021] ==================================================================
[ 1525.462121] ==================================================================
[ 1525.462146] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[ 1525.462183] Read of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.462217] 
[ 1525.462233] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.462293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.462313] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.462335] Call trace:
[ 1525.462348]  show_stack+0x20/0x38 (C)
[ 1525.462385]  dump_stack_lvl+0x8c/0xd0
[ 1525.462425]  print_report+0x118/0x608
[ 1525.462466]  kasan_report+0xdc/0x128
[ 1525.462506]  kasan_check_range+0x100/0x1a8
[ 1525.462549]  __kasan_check_read+0x20/0x30
[ 1525.462585]  copy_user_test_oob+0x728/0xec8
[ 1525.462625]  kunit_try_run_case+0x170/0x3f0
[ 1525.462665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.462711]  kthread+0x328/0x630
[ 1525.462742]  ret_from_fork+0x10/0x20
[ 1525.462780] 
[ 1525.462791] Allocated by task 356:
[ 1525.462809]  kasan_save_stack+0x3c/0x68
[ 1525.462844]  kasan_save_track+0x20/0x40
[ 1525.462877]  kasan_save_alloc_info+0x40/0x58
[ 1525.462906]  __kasan_kmalloc+0xd4/0xd8
[ 1525.462938]  __kmalloc_noprof+0x198/0x4c8
[ 1525.462971]  kunit_kmalloc_array+0x34/0x88
[ 1525.463003]  copy_user_test_oob+0xac/0xec8
[ 1525.463037]  kunit_try_run_case+0x170/0x3f0
[ 1525.463069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.463109]  kthread+0x328/0x630
[ 1525.463134]  ret_from_fork+0x10/0x20
[ 1525.463164] 
[ 1525.463175] The buggy address belongs to the object at ffff000827f2f500
[ 1525.463175]  which belongs to the cache kmalloc-128 of size 128
[ 1525.463214] The buggy address is located 0 bytes inside of
[ 1525.463214]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.463258] 
[ 1525.463269] The buggy address belongs to the physical page:
[ 1525.463287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.463322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.463354] page_type: f5(slab)
[ 1525.463381] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.463417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.463444] page dumped because: kasan: bad access detected
[ 1525.463464] 
[ 1525.463474] Memory state around the buggy address:
[ 1525.463495]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.463526]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.463556] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.463581]                                                                 ^
[ 1525.463609]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.463640]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.463666] ==================================================================
[ 1525.463883] ==================================================================
[ 1525.463910] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[ 1525.463947] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.463983] 
[ 1525.463999] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.464059] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.464079] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.464101] Call trace:
[ 1525.464114]  show_stack+0x20/0x38 (C)
[ 1525.464151]  dump_stack_lvl+0x8c/0xd0
[ 1525.464191]  print_report+0x118/0x608
[ 1525.464232]  kasan_report+0xdc/0x128
[ 1525.464272]  kasan_check_range+0x100/0x1a8
[ 1525.464315]  __kasan_check_write+0x20/0x30
[ 1525.464351]  copy_user_test_oob+0x35c/0xec8
[ 1525.464391]  kunit_try_run_case+0x170/0x3f0
[ 1525.464431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.464477]  kthread+0x328/0x630
[ 1525.464509]  ret_from_fork+0x10/0x20
[ 1525.464547] 
[ 1525.464557] Allocated by task 356:
[ 1525.464575]  kasan_save_stack+0x3c/0x68
[ 1525.464609]  kasan_save_track+0x20/0x40
[ 1525.464643]  kasan_save_alloc_info+0x40/0x58
[ 1525.464672]  __kasan_kmalloc+0xd4/0xd8
[ 1525.464705]  __kmalloc_noprof+0x198/0x4c8
[ 1525.464738]  kunit_kmalloc_array+0x34/0x88
[ 1525.464770]  copy_user_test_oob+0xac/0xec8
[ 1525.464803]  kunit_try_run_case+0x170/0x3f0
[ 1525.464835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.464875]  kthread+0x328/0x630
[ 1525.464900]  ret_from_fork+0x10/0x20
[ 1525.464930] 
[ 1525.464940] The buggy address belongs to the object at ffff000827f2f500
[ 1525.464940]  which belongs to the cache kmalloc-128 of size 128
[ 1525.464979] The buggy address is located 0 bytes inside of
[ 1525.464979]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.465023] 
[ 1525.465034] The buggy address belongs to the physical page:
[ 1525.465052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.465087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.465120] page_type: f5(slab)
[ 1525.465146] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.465182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.465209] page dumped because: kasan: bad access detected
[ 1525.465229] 
[ 1525.465239] Memory state around the buggy address:
[ 1525.465260]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.465290]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.465321] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.465346]                                                                 ^
[ 1525.465373]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.465404]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.465430] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 1525.454463] ==================================================================
[ 1525.454492] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[ 1525.454537] Read of size 8 at addr ffff000827f2f478 by task kunit_try_catch/352
[ 1525.454572] 
[ 1525.454589] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.454651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.454669] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.454693] Call trace:
[ 1525.454706]  show_stack+0x20/0x38 (C)
[ 1525.454744]  dump_stack_lvl+0x8c/0xd0
[ 1525.454785]  print_report+0x118/0x608
[ 1525.454827]  kasan_report+0xdc/0x128
[ 1525.454867]  __asan_report_load8_noabort+0x20/0x30
[ 1525.454906]  copy_to_kernel_nofault+0x204/0x250
[ 1525.454948]  copy_to_kernel_nofault_oob+0x158/0x418
[ 1525.454989]  kunit_try_run_case+0x170/0x3f0
[ 1525.455030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.455076]  kthread+0x328/0x630
[ 1525.455109]  ret_from_fork+0x10/0x20
[ 1525.455146] 
[ 1525.455158] Allocated by task 352:
[ 1525.455176]  kasan_save_stack+0x3c/0x68
[ 1525.455212]  kasan_save_track+0x20/0x40
[ 1525.455244]  kasan_save_alloc_info+0x40/0x58
[ 1525.455273]  __kasan_kmalloc+0xd4/0xd8
[ 1525.455306]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.455341]  copy_to_kernel_nofault_oob+0xc8/0x418
[ 1525.455374]  kunit_try_run_case+0x170/0x3f0
[ 1525.455407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.455446]  kthread+0x328/0x630
[ 1525.455471]  ret_from_fork+0x10/0x20
[ 1525.455501] 
[ 1525.455512] The buggy address belongs to the object at ffff000827f2f400
[ 1525.455512]  which belongs to the cache kmalloc-128 of size 128
[ 1525.455552] The buggy address is located 0 bytes to the right of
[ 1525.455552]  allocated 120-byte region [ffff000827f2f400, ffff000827f2f478)
[ 1525.455598] 
[ 1525.455609] The buggy address belongs to the physical page:
[ 1525.455628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.455664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.455697] page_type: f5(slab)
[ 1525.455725] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.455761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.455788] page dumped because: kasan: bad access detected
[ 1525.455808] 
[ 1525.455818] Memory state around the buggy address:
[ 1525.455839]  ffff000827f2f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.455869]  ffff000827f2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.455900] >ffff000827f2f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.455927]                                                                 ^
[ 1525.455954]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.455985]  ffff000827f2f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.456011] ==================================================================
[ 1525.456085] ==================================================================
[ 1525.456110] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[ 1525.456148] Write of size 8 at addr ffff000827f2f478 by task kunit_try_catch/352
[ 1525.456182] 
[ 1525.456198] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.456258] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.456278] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.456300] Call trace:
[ 1525.456313]  show_stack+0x20/0x38 (C)
[ 1525.456349]  dump_stack_lvl+0x8c/0xd0
[ 1525.456389]  print_report+0x118/0x608
[ 1525.456431]  kasan_report+0xdc/0x128
[ 1525.456471]  kasan_check_range+0x100/0x1a8
[ 1525.456516]  __kasan_check_write+0x20/0x30
[ 1525.456551]  copy_to_kernel_nofault+0x8c/0x250
[ 1525.456593]  copy_to_kernel_nofault_oob+0x1bc/0x418
[ 1525.456634]  kunit_try_run_case+0x170/0x3f0
[ 1525.456674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.456720]  kthread+0x328/0x630
[ 1525.456752]  ret_from_fork+0x10/0x20
[ 1525.456791] 
[ 1525.456801] Allocated by task 352:
[ 1525.456819]  kasan_save_stack+0x3c/0x68
[ 1525.456853]  kasan_save_track+0x20/0x40
[ 1525.456886]  kasan_save_alloc_info+0x40/0x58
[ 1525.456915]  __kasan_kmalloc+0xd4/0xd8
[ 1525.456948]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.456981]  copy_to_kernel_nofault_oob+0xc8/0x418
[ 1525.457015]  kunit_try_run_case+0x170/0x3f0
[ 1525.457048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.457087]  kthread+0x328/0x630
[ 1525.457112]  ret_from_fork+0x10/0x20
[ 1525.457143] 
[ 1525.457153] The buggy address belongs to the object at ffff000827f2f400
[ 1525.457153]  which belongs to the cache kmalloc-128 of size 128
[ 1525.457193] The buggy address is located 0 bytes to the right of
[ 1525.457193]  allocated 120-byte region [ffff000827f2f400, ffff000827f2f478)
[ 1525.457239] 
[ 1525.457249] The buggy address belongs to the physical page:
[ 1525.457268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.457302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.457334] page_type: f5(slab)
[ 1525.457361] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.457397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.457425] page dumped because: kasan: bad access detected
[ 1525.457444] 
[ 1525.457454] Memory state around the buggy address:
[ 1525.457474]  ffff000827f2f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.457505]  ffff000827f2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.457536] >ffff000827f2f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.457562]                                                                 ^
[ 1525.457589]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.457619]  ffff000827f2f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.457645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 1525.445675] ==================================================================
[ 1525.445698] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[ 1525.445729] Read of size 1 at addr ffff800087c5d7f8 by task kunit_try_catch/340
[ 1525.445764] 
[ 1525.445779] CPU: 4 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.445839] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.445859] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.445882] Call trace:
[ 1525.445894]  show_stack+0x20/0x38 (C)
[ 1525.445931]  dump_stack_lvl+0x8c/0xd0
[ 1525.445970]  print_report+0x310/0x608
[ 1525.446011]  kasan_report+0xdc/0x128
[ 1525.446051]  __asan_report_load1_noabort+0x20/0x30
[ 1525.446089]  vmalloc_oob+0x51c/0x5d0
[ 1525.446125]  kunit_try_run_case+0x170/0x3f0
[ 1525.446165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.446212]  kthread+0x328/0x630
[ 1525.446244]  ret_from_fork+0x10/0x20
[ 1525.446282] 
[ 1525.446296] The buggy address belongs to the virtual mapping at
[ 1525.446296]  [ffff800087c5d000, ffff800087c5f000) created by:
[ 1525.446296]  vmalloc_oob+0x98/0x5d0
[ 1525.446354] 
[ 1525.446364] The buggy address belongs to the physical page:
[ 1525.446384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a79b2
[ 1525.446419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.446461] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 1525.446497] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 1525.446526] page dumped because: kasan: bad access detected
[ 1525.446544] 
[ 1525.446554] Memory state around the buggy address:
[ 1525.446575]  ffff800087c5d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1525.446605]  ffff800087c5d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1525.446635] >ffff800087c5d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 1525.446661]                                                                 ^
[ 1525.446688]  ffff800087c5d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 1525.446719]  ffff800087c5d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 1525.446745] ==================================================================
[ 1525.444553] ==================================================================
[ 1525.444581] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[ 1525.444620] Read of size 1 at addr ffff800087c5d7f3 by task kunit_try_catch/340
[ 1525.444655] 
[ 1525.444673] CPU: 4 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.444736] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.444756] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.444780] Call trace:
[ 1525.444793]  show_stack+0x20/0x38 (C)
[ 1525.444830]  dump_stack_lvl+0x8c/0xd0
[ 1525.444871]  print_report+0x310/0x608
[ 1525.444913]  kasan_report+0xdc/0x128
[ 1525.444953]  __asan_report_load1_noabort+0x20/0x30
[ 1525.444991]  vmalloc_oob+0x578/0x5d0
[ 1525.445026]  kunit_try_run_case+0x170/0x3f0
[ 1525.445067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.445113]  kthread+0x328/0x630
[ 1525.445145]  ret_from_fork+0x10/0x20
[ 1525.445183] 
[ 1525.445195] The buggy address belongs to the virtual mapping at
[ 1525.445195]  [ffff800087c5d000, ffff800087c5f000) created by:
[ 1525.445195]  vmalloc_oob+0x98/0x5d0
[ 1525.445252] 
[ 1525.445264] The buggy address belongs to the physical page:
[ 1525.445283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a79b2
[ 1525.445318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.445362] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 1525.445398] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 1525.445425] page dumped because: kasan: bad access detected
[ 1525.445445] 
[ 1525.445455] Memory state around the buggy address:
[ 1525.445476]  ffff800087c5d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1525.445506]  ffff800087c5d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1525.445537] >ffff800087c5d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 1525.445563]                                                              ^
[ 1525.445590]  ffff800087c5d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 1525.445620]  ffff800087c5d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 1525.445646] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 1525.426849] ==================================================================
[ 1525.426859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[ 1525.426874] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.426888] 
[ 1525.426894] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.426919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.426927] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.426937] Call trace:
[ 1525.426942]  show_stack+0x20/0x38 (C)
[ 1525.426957]  dump_stack_lvl+0x8c/0xd0
[ 1525.426973]  print_report+0x118/0x608
[ 1525.426991]  kasan_report+0xdc/0x128
[ 1525.427008]  kasan_check_range+0x100/0x1a8
[ 1525.427027]  __kasan_check_write+0x20/0x30
[ 1525.427041]  kasan_atomics_helper+0xff0/0x4858
[ 1525.427057]  kasan_atomics+0x198/0x2e0
[ 1525.427073]  kunit_try_run_case+0x170/0x3f0
[ 1525.427089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.427108]  kthread+0x328/0x630
[ 1525.427120]  ret_from_fork+0x10/0x20
[ 1525.427136] 
[ 1525.427140] Allocated by task 336:
[ 1525.427147]  kasan_save_stack+0x3c/0x68
[ 1525.427162]  kasan_save_track+0x20/0x40
[ 1525.427176]  kasan_save_alloc_info+0x40/0x58
[ 1525.427188]  __kasan_kmalloc+0xd4/0xd8
[ 1525.427202]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.427215]  kasan_atomics+0xb8/0x2e0
[ 1525.427228]  kunit_try_run_case+0x170/0x3f0
[ 1525.427241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.427257]  kthread+0x328/0x630
[ 1525.427267]  ret_from_fork+0x10/0x20
[ 1525.427279] 
[ 1525.427283] The buggy address belongs to the object at ffff000826289e00
[ 1525.427283]  which belongs to the cache kmalloc-64 of size 64
[ 1525.427299] The buggy address is located 0 bytes to the right of
[ 1525.427299]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.427318] 
[ 1525.427322] The buggy address belongs to the physical page:
[ 1525.427330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.427344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.427357] page_type: f5(slab)
[ 1525.427368] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.427382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.427393] page dumped because: kasan: bad access detected
[ 1525.427402] 
[ 1525.427406] Memory state around the buggy address:
[ 1525.427414]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.427426]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.427438] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.427449]                                      ^
[ 1525.427458]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.427471]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.427481] ==================================================================
[ 1525.437243] ==================================================================
[ 1525.437253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[ 1525.437268] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.437282] 
[ 1525.437288] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.437314] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.437322] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.437332] Call trace:
[ 1525.437337]  show_stack+0x20/0x38 (C)
[ 1525.437352]  dump_stack_lvl+0x8c/0xd0
[ 1525.437368]  print_report+0x118/0x608
[ 1525.437386]  kasan_report+0xdc/0x128
[ 1525.437403]  kasan_check_range+0x100/0x1a8
[ 1525.437421]  __kasan_check_write+0x20/0x30
[ 1525.437436]  kasan_atomics_helper+0x1644/0x4858
[ 1525.437453]  kasan_atomics+0x198/0x2e0
[ 1525.437469]  kunit_try_run_case+0x170/0x3f0
[ 1525.437485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.437504]  kthread+0x328/0x630
[ 1525.437516]  ret_from_fork+0x10/0x20
[ 1525.437531] 
[ 1525.437535] Allocated by task 336:
[ 1525.437543]  kasan_save_stack+0x3c/0x68
[ 1525.437557]  kasan_save_track+0x20/0x40
[ 1525.437572]  kasan_save_alloc_info+0x40/0x58
[ 1525.437583]  __kasan_kmalloc+0xd4/0xd8
[ 1525.437597]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.437610]  kasan_atomics+0xb8/0x2e0
[ 1525.437623]  kunit_try_run_case+0x170/0x3f0
[ 1525.437636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.437652]  kthread+0x328/0x630
[ 1525.437662]  ret_from_fork+0x10/0x20
[ 1525.437674] 
[ 1525.437678] The buggy address belongs to the object at ffff000826289e00
[ 1525.437678]  which belongs to the cache kmalloc-64 of size 64
[ 1525.437695] The buggy address is located 0 bytes to the right of
[ 1525.437695]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.437714] 
[ 1525.437718] The buggy address belongs to the physical page:
[ 1525.437726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.437740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.437753] page_type: f5(slab)
[ 1525.437764] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.437778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.437789] page dumped because: kasan: bad access detected
[ 1525.437798] 
[ 1525.437802] Memory state around the buggy address:
[ 1525.437810]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.437822]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.437835] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.437845]                                      ^
[ 1525.437854]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.437866]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.437877] ==================================================================
[ 1525.439167] ==================================================================
[ 1525.439176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[ 1525.439191] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.439206] 
[ 1525.439212] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.439237] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.439245] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.439255] Call trace:
[ 1525.439260]  show_stack+0x20/0x38 (C)
[ 1525.439276]  dump_stack_lvl+0x8c/0xd0
[ 1525.439292]  print_report+0x118/0x608
[ 1525.439310]  kasan_report+0xdc/0x128
[ 1525.439327]  __asan_report_load8_noabort+0x20/0x30
[ 1525.439342]  kasan_atomics_helper+0x3e10/0x4858
[ 1525.439359]  kasan_atomics+0x198/0x2e0
[ 1525.439375]  kunit_try_run_case+0x170/0x3f0
[ 1525.439391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.439410]  kthread+0x328/0x630
[ 1525.439423]  ret_from_fork+0x10/0x20
[ 1525.439438] 
[ 1525.439442] Allocated by task 336:
[ 1525.439449]  kasan_save_stack+0x3c/0x68
[ 1525.439464]  kasan_save_track+0x20/0x40
[ 1525.439478]  kasan_save_alloc_info+0x40/0x58
[ 1525.439489]  __kasan_kmalloc+0xd4/0xd8
[ 1525.439503]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.439517]  kasan_atomics+0xb8/0x2e0
[ 1525.439530]  kunit_try_run_case+0x170/0x3f0
[ 1525.439543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.439558]  kthread+0x328/0x630
[ 1525.439568]  ret_from_fork+0x10/0x20
[ 1525.439581] 
[ 1525.439585] The buggy address belongs to the object at ffff000826289e00
[ 1525.439585]  which belongs to the cache kmalloc-64 of size 64
[ 1525.439601] The buggy address is located 0 bytes to the right of
[ 1525.439601]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.439620] 
[ 1525.439625] The buggy address belongs to the physical page:
[ 1525.439632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.439647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.439660] page_type: f5(slab)
[ 1525.439670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.439685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.439696] page dumped because: kasan: bad access detected
[ 1525.439704] 
[ 1525.439708] Memory state around the buggy address:
[ 1525.439717]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.439729]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.439741] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.439752]                                      ^
[ 1525.439761]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.439773]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.439784] ==================================================================
[ 1525.422952] ==================================================================
[ 1525.422961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[ 1525.422976] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.422990] 
[ 1525.422996] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.423022] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.423030] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.423039] Call trace:
[ 1525.423044]  show_stack+0x20/0x38 (C)
[ 1525.423059]  dump_stack_lvl+0x8c/0xd0
[ 1525.423076]  print_report+0x118/0x608
[ 1525.423093]  kasan_report+0xdc/0x128
[ 1525.423110]  __asan_report_load8_noabort+0x20/0x30
[ 1525.423126]  kasan_atomics_helper+0x3f58/0x4858
[ 1525.423143]  kasan_atomics+0x198/0x2e0
[ 1525.423158]  kunit_try_run_case+0x170/0x3f0
[ 1525.423175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.423194]  kthread+0x328/0x630
[ 1525.423206]  ret_from_fork+0x10/0x20
[ 1525.423222] 
[ 1525.423226] Allocated by task 336:
[ 1525.423233]  kasan_save_stack+0x3c/0x68
[ 1525.423249]  kasan_save_track+0x20/0x40
[ 1525.423263]  kasan_save_alloc_info+0x40/0x58
[ 1525.423274]  __kasan_kmalloc+0xd4/0xd8
[ 1525.423289]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.423302]  kasan_atomics+0xb8/0x2e0
[ 1525.423315]  kunit_try_run_case+0x170/0x3f0
[ 1525.423329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.423345]  kthread+0x328/0x630
[ 1525.423355]  ret_from_fork+0x10/0x20
[ 1525.423367] 
[ 1525.423371] The buggy address belongs to the object at ffff000826289e00
[ 1525.423371]  which belongs to the cache kmalloc-64 of size 64
[ 1525.423389] The buggy address is located 0 bytes to the right of
[ 1525.423389]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.423407] 
[ 1525.423412] The buggy address belongs to the physical page:
[ 1525.423420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.423434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.423448] page_type: f5(slab)
[ 1525.423458] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.423473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.423484] page dumped because: kasan: bad access detected
[ 1525.423493] 
[ 1525.423497] Memory state around the buggy address:
[ 1525.423506]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.423519]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.423531] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.423542]                                      ^
[ 1525.423551]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.423564]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.423575] ==================================================================
[ 1525.422304] ==================================================================
[ 1525.422314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[ 1525.422329] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.422343] 
[ 1525.422350] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.422375] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.422383] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.422392] Call trace:
[ 1525.422398]  show_stack+0x20/0x38 (C)
[ 1525.422413]  dump_stack_lvl+0x8c/0xd0
[ 1525.422429]  print_report+0x118/0x608
[ 1525.422447]  kasan_report+0xdc/0x128
[ 1525.422464]  kasan_check_range+0x100/0x1a8
[ 1525.422482]  __kasan_check_read+0x20/0x30
[ 1525.422496]  kasan_atomics_helper+0xdd4/0x4858
[ 1525.422513]  kasan_atomics+0x198/0x2e0
[ 1525.422528]  kunit_try_run_case+0x170/0x3f0
[ 1525.422545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.422563]  kthread+0x328/0x630
[ 1525.422575]  ret_from_fork+0x10/0x20
[ 1525.422591] 
[ 1525.422595] Allocated by task 336:
[ 1525.422602]  kasan_save_stack+0x3c/0x68
[ 1525.422617]  kasan_save_track+0x20/0x40
[ 1525.422631]  kasan_save_alloc_info+0x40/0x58
[ 1525.422643]  __kasan_kmalloc+0xd4/0xd8
[ 1525.422657]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.422670]  kasan_atomics+0xb8/0x2e0
[ 1525.422683]  kunit_try_run_case+0x170/0x3f0
[ 1525.422696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.422712]  kthread+0x328/0x630
[ 1525.422721]  ret_from_fork+0x10/0x20
[ 1525.422734] 
[ 1525.422738] The buggy address belongs to the object at ffff000826289e00
[ 1525.422738]  which belongs to the cache kmalloc-64 of size 64
[ 1525.422754] The buggy address is located 0 bytes to the right of
[ 1525.422754]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.422773] 
[ 1525.422778] The buggy address belongs to the physical page:
[ 1525.422785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.422800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.422813] page_type: f5(slab)
[ 1525.422823] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.422839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.422850] page dumped because: kasan: bad access detected
[ 1525.422859] 
[ 1525.422863] Memory state around the buggy address:
[ 1525.422871]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.422884]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.422896] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.422907]                                      ^
[ 1525.422916]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.422929]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.422940] ==================================================================
[ 1525.424264] ==================================================================
[ 1525.424275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[ 1525.424292] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.424306] 
[ 1525.424312] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.424338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.424346] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.424356] Call trace:
[ 1525.424361]  show_stack+0x20/0x38 (C)
[ 1525.424377]  dump_stack_lvl+0x8c/0xd0
[ 1525.424393]  print_report+0x118/0x608
[ 1525.424411]  kasan_report+0xdc/0x128
[ 1525.424427]  __asan_report_store8_noabort+0x20/0x30
[ 1525.424443]  kasan_atomics_helper+0x3e5c/0x4858
[ 1525.424460]  kasan_atomics+0x198/0x2e0
[ 1525.424476]  kunit_try_run_case+0x170/0x3f0
[ 1525.424492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.424511]  kthread+0x328/0x630
[ 1525.424523]  ret_from_fork+0x10/0x20
[ 1525.424539] 
[ 1525.424543] Allocated by task 336:
[ 1525.424550]  kasan_save_stack+0x3c/0x68
[ 1525.424565]  kasan_save_track+0x20/0x40
[ 1525.424579]  kasan_save_alloc_info+0x40/0x58
[ 1525.424590]  __kasan_kmalloc+0xd4/0xd8
[ 1525.424604]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.424618]  kasan_atomics+0xb8/0x2e0
[ 1525.424631]  kunit_try_run_case+0x170/0x3f0
[ 1525.424644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.424660]  kthread+0x328/0x630
[ 1525.424670]  ret_from_fork+0x10/0x20
[ 1525.424682] 
[ 1525.424686] The buggy address belongs to the object at ffff000826289e00
[ 1525.424686]  which belongs to the cache kmalloc-64 of size 64
[ 1525.424702] The buggy address is located 0 bytes to the right of
[ 1525.424702]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.424721] 
[ 1525.424725] The buggy address belongs to the physical page:
[ 1525.424734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.424748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.424761] page_type: f5(slab)
[ 1525.424772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.424787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.424798] page dumped because: kasan: bad access detected
[ 1525.424806] 
[ 1525.424810] Memory state around the buggy address:
[ 1525.424819]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.424831]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.424844] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.424855]                                      ^
[ 1525.424864]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.424876]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.424887] ==================================================================
[ 1525.421674] ==================================================================
[ 1525.421684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[ 1525.421699] Read of size 4 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.421713] 
[ 1525.421719] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.421744] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.421752] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.421762] Call trace:
[ 1525.421767]  show_stack+0x20/0x38 (C)
[ 1525.421782]  dump_stack_lvl+0x8c/0xd0
[ 1525.421799]  print_report+0x118/0x608
[ 1525.421816]  kasan_report+0xdc/0x128
[ 1525.421833]  __asan_report_load4_noabort+0x20/0x30
[ 1525.421848]  kasan_atomics_helper+0x3e04/0x4858
[ 1525.421865]  kasan_atomics+0x198/0x2e0
[ 1525.421881]  kunit_try_run_case+0x170/0x3f0
[ 1525.421897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.421916]  kthread+0x328/0x630
[ 1525.421928]  ret_from_fork+0x10/0x20
[ 1525.421944] 
[ 1525.421948] Allocated by task 336:
[ 1525.421955]  kasan_save_stack+0x3c/0x68
[ 1525.421969]  kasan_save_track+0x20/0x40
[ 1525.421984]  kasan_save_alloc_info+0x40/0x58
[ 1525.421994]  __kasan_kmalloc+0xd4/0xd8
[ 1525.422009]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.422022]  kasan_atomics+0xb8/0x2e0
[ 1525.422035]  kunit_try_run_case+0x170/0x3f0
[ 1525.422048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.422064]  kthread+0x328/0x630
[ 1525.422074]  ret_from_fork+0x10/0x20
[ 1525.422086] 
[ 1525.422090] The buggy address belongs to the object at ffff000826289e00
[ 1525.422090]  which belongs to the cache kmalloc-64 of size 64
[ 1525.422106] The buggy address is located 0 bytes to the right of
[ 1525.422106]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.422125] 
[ 1525.422130] The buggy address belongs to the physical page:
[ 1525.422137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.422152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.422165] page_type: f5(slab)
[ 1525.422176] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.422191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.422202] page dumped because: kasan: bad access detected
[ 1525.422211] 
[ 1525.422215] Memory state around the buggy address:
[ 1525.422223]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.422236]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.422249] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.422259]                                      ^
[ 1525.422269]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.422281]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.422292] ==================================================================
[ 1525.428154] ==================================================================
[ 1525.428165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[ 1525.428181] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.428195] 
[ 1525.428201] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.428227] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.428235] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.428245] Call trace:
[ 1525.428250]  show_stack+0x20/0x38 (C)
[ 1525.428266]  dump_stack_lvl+0x8c/0xd0
[ 1525.428282]  print_report+0x118/0x608
[ 1525.428300]  kasan_report+0xdc/0x128
[ 1525.428317]  kasan_check_range+0x100/0x1a8
[ 1525.428336]  __kasan_check_write+0x20/0x30
[ 1525.428350]  kasan_atomics_helper+0x10c0/0x4858
[ 1525.428367]  kasan_atomics+0x198/0x2e0
[ 1525.428382]  kunit_try_run_case+0x170/0x3f0
[ 1525.428398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.428417]  kthread+0x328/0x630
[ 1525.428429]  ret_from_fork+0x10/0x20
[ 1525.428445] 
[ 1525.428449] Allocated by task 336:
[ 1525.428456]  kasan_save_stack+0x3c/0x68
[ 1525.428471]  kasan_save_track+0x20/0x40
[ 1525.428485]  kasan_save_alloc_info+0x40/0x58
[ 1525.428496]  __kasan_kmalloc+0xd4/0xd8
[ 1525.428510]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.428524]  kasan_atomics+0xb8/0x2e0
[ 1525.428536]  kunit_try_run_case+0x170/0x3f0
[ 1525.428550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.428565]  kthread+0x328/0x630
[ 1525.428575]  ret_from_fork+0x10/0x20
[ 1525.428588] 
[ 1525.428592] The buggy address belongs to the object at ffff000826289e00
[ 1525.428592]  which belongs to the cache kmalloc-64 of size 64
[ 1525.428608] The buggy address is located 0 bytes to the right of
[ 1525.428608]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.428627] 
[ 1525.428631] The buggy address belongs to the physical page:
[ 1525.428639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.428653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.428667] page_type: f5(slab)
[ 1525.428678] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.428692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.428704] page dumped because: kasan: bad access detected
[ 1525.428712] 
[ 1525.428716] Memory state around the buggy address:
[ 1525.428724]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.428737]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.428749] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.428760]                                      ^
[ 1525.428769]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.428781]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.428792] ==================================================================
[ 1525.426201] ==================================================================
[ 1525.426211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[ 1525.426226] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.426241] 
[ 1525.426247] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.426273] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.426281] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.426291] Call trace:
[ 1525.426296]  show_stack+0x20/0x38 (C)
[ 1525.426311]  dump_stack_lvl+0x8c/0xd0
[ 1525.426328]  print_report+0x118/0x608
[ 1525.426346]  kasan_report+0xdc/0x128
[ 1525.426362]  kasan_check_range+0x100/0x1a8
[ 1525.426381]  __kasan_check_write+0x20/0x30
[ 1525.426395]  kasan_atomics_helper+0xf88/0x4858
[ 1525.426412]  kasan_atomics+0x198/0x2e0
[ 1525.426427]  kunit_try_run_case+0x170/0x3f0
[ 1525.426444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.426463]  kthread+0x328/0x630
[ 1525.426475]  ret_from_fork+0x10/0x20
[ 1525.426490] 
[ 1525.426495] Allocated by task 336:
[ 1525.426502]  kasan_save_stack+0x3c/0x68
[ 1525.426516]  kasan_save_track+0x20/0x40
[ 1525.426531]  kasan_save_alloc_info+0x40/0x58
[ 1525.426542]  __kasan_kmalloc+0xd4/0xd8
[ 1525.426556]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.426569]  kasan_atomics+0xb8/0x2e0
[ 1525.426582]  kunit_try_run_case+0x170/0x3f0
[ 1525.426596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.426612]  kthread+0x328/0x630
[ 1525.426622]  ret_from_fork+0x10/0x20
[ 1525.426634] 
[ 1525.426638] The buggy address belongs to the object at ffff000826289e00
[ 1525.426638]  which belongs to the cache kmalloc-64 of size 64
[ 1525.426655] The buggy address is located 0 bytes to the right of
[ 1525.426655]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.426673] 
[ 1525.426678] The buggy address belongs to the physical page:
[ 1525.426686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.426700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.426713] page_type: f5(slab)
[ 1525.426723] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.426738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.426749] page dumped because: kasan: bad access detected
[ 1525.426757] 
[ 1525.426761] Memory state around the buggy address:
[ 1525.426769]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.426782]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.426794] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.426805]                                      ^
[ 1525.426814]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.426827]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.426837] ==================================================================
[ 1525.432055] ==================================================================
[ 1525.432066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[ 1525.432082] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.432096] 
[ 1525.432102] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.432128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.432136] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.432146] Call trace:
[ 1525.432151]  show_stack+0x20/0x38 (C)
[ 1525.432166]  dump_stack_lvl+0x8c/0xd0
[ 1525.432183]  print_report+0x118/0x608
[ 1525.432200]  kasan_report+0xdc/0x128
[ 1525.432217]  kasan_check_range+0x100/0x1a8
[ 1525.432236]  __kasan_check_write+0x20/0x30
[ 1525.432250]  kasan_atomics_helper+0x1384/0x4858
[ 1525.432267]  kasan_atomics+0x198/0x2e0
[ 1525.432282]  kunit_try_run_case+0x170/0x3f0
[ 1525.432298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.432317]  kthread+0x328/0x630
[ 1525.432329]  ret_from_fork+0x10/0x20
[ 1525.432344] 
[ 1525.432349] Allocated by task 336:
[ 1525.432356]  kasan_save_stack+0x3c/0x68
[ 1525.432371]  kasan_save_track+0x20/0x40
[ 1525.432385]  kasan_save_alloc_info+0x40/0x58
[ 1525.432396]  __kasan_kmalloc+0xd4/0xd8
[ 1525.432410]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.432424]  kasan_atomics+0xb8/0x2e0
[ 1525.432437]  kunit_try_run_case+0x170/0x3f0
[ 1525.432450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.432466]  kthread+0x328/0x630
[ 1525.432475]  ret_from_fork+0x10/0x20
[ 1525.432488] 
[ 1525.432492] The buggy address belongs to the object at ffff000826289e00
[ 1525.432492]  which belongs to the cache kmalloc-64 of size 64
[ 1525.432508] The buggy address is located 0 bytes to the right of
[ 1525.432508]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.432527] 
[ 1525.432532] The buggy address belongs to the physical page:
[ 1525.432539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.432554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.432567] page_type: f5(slab)
[ 1525.432578] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.432592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.432603] page dumped because: kasan: bad access detected
[ 1525.432611] 
[ 1525.432616] Memory state around the buggy address:
[ 1525.432624]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.432636]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.432648] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.432659]                                      ^
[ 1525.432668]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.432680]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.432691] ==================================================================
[ 1525.431395] ==================================================================
[ 1525.431405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[ 1525.431420] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.431434] 
[ 1525.431440] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.431465] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.431473] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.431483] Call trace:
[ 1525.431488]  show_stack+0x20/0x38 (C)
[ 1525.431503]  dump_stack_lvl+0x8c/0xd0
[ 1525.431520]  print_report+0x118/0x608
[ 1525.431537]  kasan_report+0xdc/0x128
[ 1525.431554]  kasan_check_range+0x100/0x1a8
[ 1525.431573]  __kasan_check_write+0x20/0x30
[ 1525.431587]  kasan_atomics_helper+0x12d8/0x4858
[ 1525.431604]  kasan_atomics+0x198/0x2e0
[ 1525.431620]  kunit_try_run_case+0x170/0x3f0
[ 1525.431636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.431654]  kthread+0x328/0x630
[ 1525.431667]  ret_from_fork+0x10/0x20
[ 1525.431682] 
[ 1525.431686] Allocated by task 336:
[ 1525.431693]  kasan_save_stack+0x3c/0x68
[ 1525.431708]  kasan_save_track+0x20/0x40
[ 1525.431722]  kasan_save_alloc_info+0x40/0x58
[ 1525.431733]  __kasan_kmalloc+0xd4/0xd8
[ 1525.431748]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.431761]  kasan_atomics+0xb8/0x2e0
[ 1525.431774]  kunit_try_run_case+0x170/0x3f0
[ 1525.431787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.431803]  kthread+0x328/0x630
[ 1525.431813]  ret_from_fork+0x10/0x20
[ 1525.431825] 
[ 1525.431829] The buggy address belongs to the object at ffff000826289e00
[ 1525.431829]  which belongs to the cache kmalloc-64 of size 64
[ 1525.431846] The buggy address is located 0 bytes to the right of
[ 1525.431846]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.431865] 
[ 1525.431869] The buggy address belongs to the physical page:
[ 1525.431877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.431892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.431904] page_type: f5(slab)
[ 1525.431915] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.431929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.431941] page dumped because: kasan: bad access detected
[ 1525.431949] 
[ 1525.431953] Memory state around the buggy address:
[ 1525.431961]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.431974]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.431986] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.431996]                                      ^
[ 1525.432005]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.432018]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.432029] ==================================================================
[ 1525.432703] ==================================================================
[ 1525.432713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[ 1525.432728] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.432742] 
[ 1525.432748] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.432774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.432782] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.432792] Call trace:
[ 1525.432797]  show_stack+0x20/0x38 (C)
[ 1525.432812]  dump_stack_lvl+0x8c/0xd0
[ 1525.432829]  print_report+0x118/0x608
[ 1525.432847]  kasan_report+0xdc/0x128
[ 1525.432864]  __asan_report_load8_noabort+0x20/0x30
[ 1525.432880]  kasan_atomics_helper+0x3f04/0x4858
[ 1525.432897]  kasan_atomics+0x198/0x2e0
[ 1525.432913]  kunit_try_run_case+0x170/0x3f0
[ 1525.432929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.432948]  kthread+0x328/0x630
[ 1525.432960]  ret_from_fork+0x10/0x20
[ 1525.432976] 
[ 1525.432980] Allocated by task 336:
[ 1525.432987]  kasan_save_stack+0x3c/0x68
[ 1525.433002]  kasan_save_track+0x20/0x40
[ 1525.433016]  kasan_save_alloc_info+0x40/0x58
[ 1525.433027]  __kasan_kmalloc+0xd4/0xd8
[ 1525.433041]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.433054]  kasan_atomics+0xb8/0x2e0
[ 1525.433067]  kunit_try_run_case+0x170/0x3f0
[ 1525.433081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.433096]  kthread+0x328/0x630
[ 1525.433106]  ret_from_fork+0x10/0x20
[ 1525.433118] 
[ 1525.433123] The buggy address belongs to the object at ffff000826289e00
[ 1525.433123]  which belongs to the cache kmalloc-64 of size 64
[ 1525.433139] The buggy address is located 0 bytes to the right of
[ 1525.433139]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.433158] 
[ 1525.433162] The buggy address belongs to the physical page:
[ 1525.433170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.433185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.433198] page_type: f5(slab)
[ 1525.433208] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.433222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.433234] page dumped because: kasan: bad access detected
[ 1525.433242] 
[ 1525.433246] Memory state around the buggy address:
[ 1525.433255]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.433267]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.433279] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.433290]                                      ^
[ 1525.433299]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.433311]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.433322] ==================================================================
[ 1525.425550] ==================================================================
[ 1525.425560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[ 1525.425576] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.425590] 
[ 1525.425596] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.425622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.425630] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.425639] Call trace:
[ 1525.425645]  show_stack+0x20/0x38 (C)
[ 1525.425660]  dump_stack_lvl+0x8c/0xd0
[ 1525.425677]  print_report+0x118/0x608
[ 1525.425695]  kasan_report+0xdc/0x128
[ 1525.425712]  kasan_check_range+0x100/0x1a8
[ 1525.425730]  __kasan_check_write+0x20/0x30
[ 1525.425745]  kasan_atomics_helper+0xf20/0x4858
[ 1525.425761]  kasan_atomics+0x198/0x2e0
[ 1525.425777]  kunit_try_run_case+0x170/0x3f0
[ 1525.425793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.425812]  kthread+0x328/0x630
[ 1525.425824]  ret_from_fork+0x10/0x20
[ 1525.425840] 
[ 1525.425844] Allocated by task 336:
[ 1525.425852]  kasan_save_stack+0x3c/0x68
[ 1525.425866]  kasan_save_track+0x20/0x40
[ 1525.425880]  kasan_save_alloc_info+0x40/0x58
[ 1525.425892]  __kasan_kmalloc+0xd4/0xd8
[ 1525.425905]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.425919]  kasan_atomics+0xb8/0x2e0
[ 1525.425932]  kunit_try_run_case+0x170/0x3f0
[ 1525.425945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.425962]  kthread+0x328/0x630
[ 1525.425971]  ret_from_fork+0x10/0x20
[ 1525.425984] 
[ 1525.425988] The buggy address belongs to the object at ffff000826289e00
[ 1525.425988]  which belongs to the cache kmalloc-64 of size 64
[ 1525.426005] The buggy address is located 0 bytes to the right of
[ 1525.426005]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.426023] 
[ 1525.426028] The buggy address belongs to the physical page:
[ 1525.426036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.426050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.426063] page_type: f5(slab)
[ 1525.426074] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.426088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.426100] page dumped because: kasan: bad access detected
[ 1525.426108] 
[ 1525.426112] Memory state around the buggy address:
[ 1525.426120]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.426133]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.426146] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.426157]                                      ^
[ 1525.426166]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.426178]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.426189] ==================================================================
[ 1525.421025] ==================================================================
[ 1525.421035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[ 1525.421050] Write of size 4 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.421064] 
[ 1525.421070] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.421096] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.421104] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.421114] Call trace:
[ 1525.421119]  show_stack+0x20/0x38 (C)
[ 1525.421134]  dump_stack_lvl+0x8c/0xd0
[ 1525.421151]  print_report+0x118/0x608
[ 1525.421168]  kasan_report+0xdc/0x128
[ 1525.421185]  kasan_check_range+0x100/0x1a8
[ 1525.421203]  __kasan_check_write+0x20/0x30
[ 1525.421218]  kasan_atomics_helper+0xd3c/0x4858
[ 1525.421234]  kasan_atomics+0x198/0x2e0
[ 1525.421250]  kunit_try_run_case+0x170/0x3f0
[ 1525.421266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.421285]  kthread+0x328/0x630
[ 1525.421297]  ret_from_fork+0x10/0x20
[ 1525.421313] 
[ 1525.421317] Allocated by task 336:
[ 1525.421325]  kasan_save_stack+0x3c/0x68
[ 1525.421339]  kasan_save_track+0x20/0x40
[ 1525.421353]  kasan_save_alloc_info+0x40/0x58
[ 1525.421365]  __kasan_kmalloc+0xd4/0xd8
[ 1525.421378]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.421392]  kasan_atomics+0xb8/0x2e0
[ 1525.421405]  kunit_try_run_case+0x170/0x3f0
[ 1525.421418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.421434]  kthread+0x328/0x630
[ 1525.421444]  ret_from_fork+0x10/0x20
[ 1525.421456] 
[ 1525.421460] The buggy address belongs to the object at ffff000826289e00
[ 1525.421460]  which belongs to the cache kmalloc-64 of size 64
[ 1525.421477] The buggy address is located 0 bytes to the right of
[ 1525.421477]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.421496] 
[ 1525.421500] The buggy address belongs to the physical page:
[ 1525.421508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.421523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.421536] page_type: f5(slab)
[ 1525.421547] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.421562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.421573] page dumped because: kasan: bad access detected
[ 1525.421582] 
[ 1525.421586] Memory state around the buggy address:
[ 1525.421594]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.421607]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.421619] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.421630]                                      ^
[ 1525.421639]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.421651]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.421662] ==================================================================
[ 1525.424900] ==================================================================
[ 1525.424909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[ 1525.424925] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.424939] 
[ 1525.424945] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.424971] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.424980] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.424990] Call trace:
[ 1525.424995]  show_stack+0x20/0x38 (C)
[ 1525.425010]  dump_stack_lvl+0x8c/0xd0
[ 1525.425027]  print_report+0x118/0x608
[ 1525.425044]  kasan_report+0xdc/0x128
[ 1525.425061]  kasan_check_range+0x100/0x1a8
[ 1525.425079]  __kasan_check_write+0x20/0x30
[ 1525.425093]  kasan_atomics_helper+0xeb8/0x4858
[ 1525.425110]  kasan_atomics+0x198/0x2e0
[ 1525.425126]  kunit_try_run_case+0x170/0x3f0
[ 1525.425142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.425161]  kthread+0x328/0x630
[ 1525.425173]  ret_from_fork+0x10/0x20
[ 1525.425189] 
[ 1525.425194] Allocated by task 336:
[ 1525.425200]  kasan_save_stack+0x3c/0x68
[ 1525.425215]  kasan_save_track+0x20/0x40
[ 1525.425229]  kasan_save_alloc_info+0x40/0x58
[ 1525.425241]  __kasan_kmalloc+0xd4/0xd8
[ 1525.425255]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.425269]  kasan_atomics+0xb8/0x2e0
[ 1525.425282]  kunit_try_run_case+0x170/0x3f0
[ 1525.425295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.425311]  kthread+0x328/0x630
[ 1525.425321]  ret_from_fork+0x10/0x20
[ 1525.425333] 
[ 1525.425338] The buggy address belongs to the object at ffff000826289e00
[ 1525.425338]  which belongs to the cache kmalloc-64 of size 64
[ 1525.425354] The buggy address is located 0 bytes to the right of
[ 1525.425354]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.425373] 
[ 1525.425378] The buggy address belongs to the physical page:
[ 1525.425385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.425400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.425413] page_type: f5(slab)
[ 1525.425423] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.425438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.425449] page dumped because: kasan: bad access detected
[ 1525.425458] 
[ 1525.425462] Memory state around the buggy address:
[ 1525.425470]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.425483]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.425495] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.425506]                                      ^
[ 1525.425515]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.425528]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.425538] ==================================================================
[ 1525.430101] ==================================================================
[ 1525.430110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[ 1525.430125] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.430140] 
[ 1525.430145] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.430171] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.430179] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.430189] Call trace:
[ 1525.430194]  show_stack+0x20/0x38 (C)
[ 1525.430210]  dump_stack_lvl+0x8c/0xd0
[ 1525.430226]  print_report+0x118/0x608
[ 1525.430243]  kasan_report+0xdc/0x128
[ 1525.430260]  kasan_check_range+0x100/0x1a8
[ 1525.430279]  __kasan_check_write+0x20/0x30
[ 1525.430293]  kasan_atomics_helper+0x11f8/0x4858
[ 1525.430310]  kasan_atomics+0x198/0x2e0
[ 1525.430326]  kunit_try_run_case+0x170/0x3f0
[ 1525.430341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.430360]  kthread+0x328/0x630
[ 1525.430373]  ret_from_fork+0x10/0x20
[ 1525.430388] 
[ 1525.430392] Allocated by task 336:
[ 1525.430399]  kasan_save_stack+0x3c/0x68
[ 1525.430414]  kasan_save_track+0x20/0x40
[ 1525.430428]  kasan_save_alloc_info+0x40/0x58
[ 1525.430439]  __kasan_kmalloc+0xd4/0xd8
[ 1525.430453]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.430467]  kasan_atomics+0xb8/0x2e0
[ 1525.430480]  kunit_try_run_case+0x170/0x3f0
[ 1525.430493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.430509]  kthread+0x328/0x630
[ 1525.430519]  ret_from_fork+0x10/0x20
[ 1525.430531] 
[ 1525.430535] The buggy address belongs to the object at ffff000826289e00
[ 1525.430535]  which belongs to the cache kmalloc-64 of size 64
[ 1525.430552] The buggy address is located 0 bytes to the right of
[ 1525.430552]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.430571] 
[ 1525.430575] The buggy address belongs to the physical page:
[ 1525.430583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.430597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.430610] page_type: f5(slab)
[ 1525.430621] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.430635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.430647] page dumped because: kasan: bad access detected
[ 1525.430655] 
[ 1525.430659] Memory state around the buggy address:
[ 1525.430667]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.430680]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.430692] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.430702]                                      ^
[ 1525.430712]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.430725]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.430736] ==================================================================
[ 1525.437889] ==================================================================
[ 1525.437899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[ 1525.437914] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.437928] 
[ 1525.437934] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.437959] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.437968] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.437978] Call trace:
[ 1525.437983]  show_stack+0x20/0x38 (C)
[ 1525.437998]  dump_stack_lvl+0x8c/0xd0
[ 1525.438015]  print_report+0x118/0x608
[ 1525.438032]  kasan_report+0xdc/0x128
[ 1525.438050]  __asan_report_load8_noabort+0x20/0x30
[ 1525.438065]  kasan_atomics_helper+0x3df4/0x4858
[ 1525.438082]  kasan_atomics+0x198/0x2e0
[ 1525.438098]  kunit_try_run_case+0x170/0x3f0
[ 1525.438115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.438134]  kthread+0x328/0x630
[ 1525.438146]  ret_from_fork+0x10/0x20
[ 1525.438161] 
[ 1525.438165] Allocated by task 336:
[ 1525.438173]  kasan_save_stack+0x3c/0x68
[ 1525.438187]  kasan_save_track+0x20/0x40
[ 1525.438201]  kasan_save_alloc_info+0x40/0x58
[ 1525.438213]  __kasan_kmalloc+0xd4/0xd8
[ 1525.438226]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.438240]  kasan_atomics+0xb8/0x2e0
[ 1525.438253]  kunit_try_run_case+0x170/0x3f0
[ 1525.438266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.438282]  kthread+0x328/0x630
[ 1525.438291]  ret_from_fork+0x10/0x20
[ 1525.438304] 
[ 1525.438308] The buggy address belongs to the object at ffff000826289e00
[ 1525.438308]  which belongs to the cache kmalloc-64 of size 64
[ 1525.438324] The buggy address is located 0 bytes to the right of
[ 1525.438324]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.438343] 
[ 1525.438347] The buggy address belongs to the physical page:
[ 1525.438355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.438370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.438383] page_type: f5(slab)
[ 1525.438393] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.438408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.438419] page dumped because: kasan: bad access detected
[ 1525.438428] 
[ 1525.438432] Memory state around the buggy address:
[ 1525.438439]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.438452]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.438464] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.438475]                                      ^
[ 1525.438483]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.438496]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.438507] ==================================================================
[ 1525.433981] ==================================================================
[ 1525.433990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[ 1525.434006] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.434020] 
[ 1525.434026] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.434051] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.434059] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.434069] Call trace:
[ 1525.434074]  show_stack+0x20/0x38 (C)
[ 1525.434089]  dump_stack_lvl+0x8c/0xd0
[ 1525.434106]  print_report+0x118/0x608
[ 1525.434123]  kasan_report+0xdc/0x128
[ 1525.434140]  kasan_check_range+0x100/0x1a8
[ 1525.434159]  __kasan_check_write+0x20/0x30
[ 1525.434173]  kasan_atomics_helper+0x147c/0x4858
[ 1525.434190]  kasan_atomics+0x198/0x2e0
[ 1525.434206]  kunit_try_run_case+0x170/0x3f0
[ 1525.434221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.434240]  kthread+0x328/0x630
[ 1525.434252]  ret_from_fork+0x10/0x20
[ 1525.434268] 
[ 1525.434272] Allocated by task 336:
[ 1525.434280]  kasan_save_stack+0x3c/0x68
[ 1525.434294]  kasan_save_track+0x20/0x40
[ 1525.434308]  kasan_save_alloc_info+0x40/0x58
[ 1525.434320]  __kasan_kmalloc+0xd4/0xd8
[ 1525.434333]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.434347]  kasan_atomics+0xb8/0x2e0
[ 1525.434360]  kunit_try_run_case+0x170/0x3f0
[ 1525.434373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.434389]  kthread+0x328/0x630
[ 1525.434398]  ret_from_fork+0x10/0x20
[ 1525.434411] 
[ 1525.434415] The buggy address belongs to the object at ffff000826289e00
[ 1525.434415]  which belongs to the cache kmalloc-64 of size 64
[ 1525.434431] The buggy address is located 0 bytes to the right of
[ 1525.434431]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.434450] 
[ 1525.434455] The buggy address belongs to the physical page:
[ 1525.434463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.434477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.434490] page_type: f5(slab)
[ 1525.434500] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.434515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.434526] page dumped because: kasan: bad access detected
[ 1525.434534] 
[ 1525.434539] Memory state around the buggy address:
[ 1525.434547]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.434559]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.434571] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.434582]                                      ^
[ 1525.434591]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.434603]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.434614] ==================================================================
[ 1525.427493] ==================================================================
[ 1525.427502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[ 1525.427518] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.427532] 
[ 1525.427538] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.427563] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.427571] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.427581] Call trace:
[ 1525.427586]  show_stack+0x20/0x38 (C)
[ 1525.427601]  dump_stack_lvl+0x8c/0xd0
[ 1525.427618]  print_report+0x118/0x608
[ 1525.427635]  kasan_report+0xdc/0x128
[ 1525.427652]  kasan_check_range+0x100/0x1a8
[ 1525.427671]  __kasan_check_write+0x20/0x30
[ 1525.427685]  kasan_atomics_helper+0x1058/0x4858
[ 1525.427702]  kasan_atomics+0x198/0x2e0
[ 1525.427717]  kunit_try_run_case+0x170/0x3f0
[ 1525.427734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.427752]  kthread+0x328/0x630
[ 1525.427765]  ret_from_fork+0x10/0x20
[ 1525.427781] 
[ 1525.427785] Allocated by task 336:
[ 1525.427792]  kasan_save_stack+0x3c/0x68
[ 1525.427807]  kasan_save_track+0x20/0x40
[ 1525.427821]  kasan_save_alloc_info+0x40/0x58
[ 1525.427832]  __kasan_kmalloc+0xd4/0xd8
[ 1525.427846]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.427860]  kasan_atomics+0xb8/0x2e0
[ 1525.427873]  kunit_try_run_case+0x170/0x3f0
[ 1525.427886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.427902]  kthread+0x328/0x630
[ 1525.427911]  ret_from_fork+0x10/0x20
[ 1525.427924] 
[ 1525.427928] The buggy address belongs to the object at ffff000826289e00
[ 1525.427928]  which belongs to the cache kmalloc-64 of size 64
[ 1525.427945] The buggy address is located 0 bytes to the right of
[ 1525.427945]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.427963] 
[ 1525.427968] The buggy address belongs to the physical page:
[ 1525.427976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.427990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.428003] page_type: f5(slab)
[ 1525.428014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.428028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.428039] page dumped because: kasan: bad access detected
[ 1525.428048] 
[ 1525.428052] Memory state around the buggy address:
[ 1525.428060]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.428072]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.428085] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.428095]                                      ^
[ 1525.428104]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.428116]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.428127] ==================================================================
[ 1525.423587] ==================================================================
[ 1525.423597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[ 1525.423612] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.423626] 
[ 1525.423632] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.423658] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.423666] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.423675] Call trace:
[ 1525.423680]  show_stack+0x20/0x38 (C)
[ 1525.423695]  dump_stack_lvl+0x8c/0xd0
[ 1525.423712]  print_report+0x118/0x608
[ 1525.423729]  kasan_report+0xdc/0x128
[ 1525.423746]  kasan_check_range+0x100/0x1a8
[ 1525.423765]  __kasan_check_write+0x20/0x30
[ 1525.423779]  kasan_atomics_helper+0xe44/0x4858
[ 1525.423795]  kasan_atomics+0x198/0x2e0
[ 1525.423811]  kunit_try_run_case+0x170/0x3f0
[ 1525.423827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.423846]  kthread+0x328/0x630
[ 1525.423859]  ret_from_fork+0x10/0x20
[ 1525.423874] 
[ 1525.423878] Allocated by task 336:
[ 1525.423885]  kasan_save_stack+0x3c/0x68
[ 1525.423900]  kasan_save_track+0x20/0x40
[ 1525.423914]  kasan_save_alloc_info+0x40/0x58
[ 1525.423925]  __kasan_kmalloc+0xd4/0xd8
[ 1525.423939]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.423953]  kasan_atomics+0xb8/0x2e0
[ 1525.423965]  kunit_try_run_case+0x170/0x3f0
[ 1525.423979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.423995]  kthread+0x328/0x630
[ 1525.424004]  ret_from_fork+0x10/0x20
[ 1525.424017] 
[ 1525.424021] The buggy address belongs to the object at ffff000826289e00
[ 1525.424021]  which belongs to the cache kmalloc-64 of size 64
[ 1525.424037] The buggy address is located 0 bytes to the right of
[ 1525.424037]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.424056] 
[ 1525.424060] The buggy address belongs to the physical page:
[ 1525.424068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.424083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.424096] page_type: f5(slab)
[ 1525.424107] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.424121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.424133] page dumped because: kasan: bad access detected
[ 1525.424141] 
[ 1525.424145] Memory state around the buggy address:
[ 1525.424154]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.424166]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.424179] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.424189]                                      ^
[ 1525.424198]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.424211]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.424222] ==================================================================
[ 1525.428804] ==================================================================
[ 1525.428814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[ 1525.428829] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.428843] 
[ 1525.428849] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.428875] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.428883] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.428893] Call trace:
[ 1525.428898]  show_stack+0x20/0x38 (C)
[ 1525.428914]  dump_stack_lvl+0x8c/0xd0
[ 1525.428930]  print_report+0x118/0x608
[ 1525.428947]  kasan_report+0xdc/0x128
[ 1525.428965]  kasan_check_range+0x100/0x1a8
[ 1525.428983]  __kasan_check_write+0x20/0x30
[ 1525.428997]  kasan_atomics_helper+0x1128/0x4858
[ 1525.429014]  kasan_atomics+0x198/0x2e0
[ 1525.429030]  kunit_try_run_case+0x170/0x3f0
[ 1525.429047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.429065]  kthread+0x328/0x630
[ 1525.429078]  ret_from_fork+0x10/0x20
[ 1525.429093] 
[ 1525.429097] Allocated by task 336:
[ 1525.429104]  kasan_save_stack+0x3c/0x68
[ 1525.429119]  kasan_save_track+0x20/0x40
[ 1525.429133]  kasan_save_alloc_info+0x40/0x58
[ 1525.429144]  __kasan_kmalloc+0xd4/0xd8
[ 1525.429158]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.429172]  kasan_atomics+0xb8/0x2e0
[ 1525.429184]  kunit_try_run_case+0x170/0x3f0
[ 1525.429198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.429214]  kthread+0x328/0x630
[ 1525.429223]  ret_from_fork+0x10/0x20
[ 1525.429235] 
[ 1525.429240] The buggy address belongs to the object at ffff000826289e00
[ 1525.429240]  which belongs to the cache kmalloc-64 of size 64
[ 1525.429256] The buggy address is located 0 bytes to the right of
[ 1525.429256]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.429275] 
[ 1525.429279] The buggy address belongs to the physical page:
[ 1525.429287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.429302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.429315] page_type: f5(slab)
[ 1525.429325] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.429340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.429351] page dumped because: kasan: bad access detected
[ 1525.429360] 
[ 1525.429364] Memory state around the buggy address:
[ 1525.429372]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.429385]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.429397] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.429408]                                      ^
[ 1525.429416]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.429429]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.429440] ==================================================================
[ 1525.438519] ==================================================================
[ 1525.438528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[ 1525.438543] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.438557] 
[ 1525.438563] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.438589] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.438597] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.438607] Call trace:
[ 1525.438612]  show_stack+0x20/0x38 (C)
[ 1525.438628]  dump_stack_lvl+0x8c/0xd0
[ 1525.438644]  print_report+0x118/0x608
[ 1525.438662]  kasan_report+0xdc/0x128
[ 1525.438679]  kasan_check_range+0x100/0x1a8
[ 1525.438699]  __kasan_check_write+0x20/0x30
[ 1525.438713]  kasan_atomics_helper+0x16d0/0x4858
[ 1525.438730]  kasan_atomics+0x198/0x2e0
[ 1525.438746]  kunit_try_run_case+0x170/0x3f0
[ 1525.438762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.438781]  kthread+0x328/0x630
[ 1525.438794]  ret_from_fork+0x10/0x20
[ 1525.438809] 
[ 1525.438813] Allocated by task 336:
[ 1525.438821]  kasan_save_stack+0x3c/0x68
[ 1525.438835]  kasan_save_track+0x20/0x40
[ 1525.438849]  kasan_save_alloc_info+0x40/0x58
[ 1525.438861]  __kasan_kmalloc+0xd4/0xd8
[ 1525.438875]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.438889]  kasan_atomics+0xb8/0x2e0
[ 1525.438901]  kunit_try_run_case+0x170/0x3f0
[ 1525.438915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.438930]  kthread+0x328/0x630
[ 1525.438940]  ret_from_fork+0x10/0x20
[ 1525.438952] 
[ 1525.438956] The buggy address belongs to the object at ffff000826289e00
[ 1525.438956]  which belongs to the cache kmalloc-64 of size 64
[ 1525.438973] The buggy address is located 0 bytes to the right of
[ 1525.438973]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.438992] 
[ 1525.438996] The buggy address belongs to the physical page:
[ 1525.439004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.439018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.439031] page_type: f5(slab)
[ 1525.439041] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.439056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.439068] page dumped because: kasan: bad access detected
[ 1525.439076] 
[ 1525.439080] Memory state around the buggy address:
[ 1525.439088]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.439100]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.439112] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.439123]                                      ^
[ 1525.439131]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.439144]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.439155] ==================================================================
[ 1525.429452] ==================================================================
[ 1525.429462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[ 1525.429477] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.429491] 
[ 1525.429497] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.429523] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.429531] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.429541] Call trace:
[ 1525.429546]  show_stack+0x20/0x38 (C)
[ 1525.429562]  dump_stack_lvl+0x8c/0xd0
[ 1525.429578]  print_report+0x118/0x608
[ 1525.429595]  kasan_report+0xdc/0x128
[ 1525.429612]  kasan_check_range+0x100/0x1a8
[ 1525.429631]  __kasan_check_write+0x20/0x30
[ 1525.429645]  kasan_atomics_helper+0x1190/0x4858
[ 1525.429663]  kasan_atomics+0x198/0x2e0
[ 1525.429678]  kunit_try_run_case+0x170/0x3f0
[ 1525.429694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.429713]  kthread+0x328/0x630
[ 1525.429725]  ret_from_fork+0x10/0x20
[ 1525.429741] 
[ 1525.429745] Allocated by task 336:
[ 1525.429752]  kasan_save_stack+0x3c/0x68
[ 1525.429767]  kasan_save_track+0x20/0x40
[ 1525.429781]  kasan_save_alloc_info+0x40/0x58
[ 1525.429792]  __kasan_kmalloc+0xd4/0xd8
[ 1525.429806]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.429819]  kasan_atomics+0xb8/0x2e0
[ 1525.429832]  kunit_try_run_case+0x170/0x3f0
[ 1525.429846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.429862]  kthread+0x328/0x630
[ 1525.429871]  ret_from_fork+0x10/0x20
[ 1525.429884] 
[ 1525.429888] The buggy address belongs to the object at ffff000826289e00
[ 1525.429888]  which belongs to the cache kmalloc-64 of size 64
[ 1525.429905] The buggy address is located 0 bytes to the right of
[ 1525.429905]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.429924] 
[ 1525.429928] The buggy address belongs to the physical page:
[ 1525.429936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.429951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.429964] page_type: f5(slab)
[ 1525.429974] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.429989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.430000] page dumped because: kasan: bad access detected
[ 1525.430009] 
[ 1525.430013] Memory state around the buggy address:
[ 1525.430021]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.430034]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.430046] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.430056]                                      ^
[ 1525.430065]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.430078]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.430088] ==================================================================
[ 1525.430748] ==================================================================
[ 1525.430758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[ 1525.430773] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.430787] 
[ 1525.430793] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.430819] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.430827] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.430837] Call trace:
[ 1525.430842]  show_stack+0x20/0x38 (C)
[ 1525.430858]  dump_stack_lvl+0x8c/0xd0
[ 1525.430874]  print_report+0x118/0x608
[ 1525.430891]  kasan_report+0xdc/0x128
[ 1525.430908]  kasan_check_range+0x100/0x1a8
[ 1525.430927]  __kasan_check_write+0x20/0x30
[ 1525.430941]  kasan_atomics_helper+0x126c/0x4858
[ 1525.430958]  kasan_atomics+0x198/0x2e0
[ 1525.430974]  kunit_try_run_case+0x170/0x3f0
[ 1525.430990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.431009]  kthread+0x328/0x630
[ 1525.431021]  ret_from_fork+0x10/0x20
[ 1525.431036] 
[ 1525.431040] Allocated by task 336:
[ 1525.431048]  kasan_save_stack+0x3c/0x68
[ 1525.431063]  kasan_save_track+0x20/0x40
[ 1525.431077]  kasan_save_alloc_info+0x40/0x58
[ 1525.431088]  __kasan_kmalloc+0xd4/0xd8
[ 1525.431102]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.431115]  kasan_atomics+0xb8/0x2e0
[ 1525.431128]  kunit_try_run_case+0x170/0x3f0
[ 1525.431141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.431157]  kthread+0x328/0x630
[ 1525.431166]  ret_from_fork+0x10/0x20
[ 1525.431179] 
[ 1525.431183] The buggy address belongs to the object at ffff000826289e00
[ 1525.431183]  which belongs to the cache kmalloc-64 of size 64
[ 1525.431200] The buggy address is located 0 bytes to the right of
[ 1525.431200]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.431219] 
[ 1525.431223] The buggy address belongs to the physical page:
[ 1525.431231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.431245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.431258] page_type: f5(slab)
[ 1525.431269] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.431283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.431295] page dumped because: kasan: bad access detected
[ 1525.431303] 
[ 1525.431307] Memory state around the buggy address:
[ 1525.431315]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.431328]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.431340] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.431351]                                      ^
[ 1525.431360]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.431372]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.431383] ==================================================================
[ 1525.434626] ==================================================================
[ 1525.434635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[ 1525.434650] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.434664] 
[ 1525.434670] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.434696] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.434705] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.434714] Call trace:
[ 1525.434720]  show_stack+0x20/0x38 (C)
[ 1525.434735]  dump_stack_lvl+0x8c/0xd0
[ 1525.434751]  print_report+0x118/0x608
[ 1525.434769]  kasan_report+0xdc/0x128
[ 1525.434786]  kasan_check_range+0x100/0x1a8
[ 1525.434805]  __kasan_check_write+0x20/0x30
[ 1525.434819]  kasan_atomics_helper+0x14e4/0x4858
[ 1525.434837]  kasan_atomics+0x198/0x2e0
[ 1525.434852]  kunit_try_run_case+0x170/0x3f0
[ 1525.434868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.434887]  kthread+0x328/0x630
[ 1525.434900]  ret_from_fork+0x10/0x20
[ 1525.434915] 
[ 1525.434919] Allocated by task 336:
[ 1525.434927]  kasan_save_stack+0x3c/0x68
[ 1525.434941]  kasan_save_track+0x20/0x40
[ 1525.434955]  kasan_save_alloc_info+0x40/0x58
[ 1525.434967]  __kasan_kmalloc+0xd4/0xd8
[ 1525.434980]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.434994]  kasan_atomics+0xb8/0x2e0
[ 1525.435007]  kunit_try_run_case+0x170/0x3f0
[ 1525.435020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.435036]  kthread+0x328/0x630
[ 1525.435045]  ret_from_fork+0x10/0x20
[ 1525.435058] 
[ 1525.435062] The buggy address belongs to the object at ffff000826289e00
[ 1525.435062]  which belongs to the cache kmalloc-64 of size 64
[ 1525.435078] The buggy address is located 0 bytes to the right of
[ 1525.435078]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.435097] 
[ 1525.435102] The buggy address belongs to the physical page:
[ 1525.435109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.435124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.435137] page_type: f5(slab)
[ 1525.435147] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.435161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.435173] page dumped because: kasan: bad access detected
[ 1525.435181] 
[ 1525.435185] Memory state around the buggy address:
[ 1525.435193]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.435206]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.435218] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.435229]                                      ^
[ 1525.435238]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.435250]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.435262] ==================================================================
[ 1525.435274] ==================================================================
[ 1525.435284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[ 1525.435299] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.435313] 
[ 1525.435319] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.435345] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.435353] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.435362] Call trace:
[ 1525.435368]  show_stack+0x20/0x38 (C)
[ 1525.435383]  dump_stack_lvl+0x8c/0xd0
[ 1525.435400]  print_report+0x118/0x608
[ 1525.435417]  kasan_report+0xdc/0x128
[ 1525.435435]  kasan_check_range+0x100/0x1a8
[ 1525.435453]  __kasan_check_write+0x20/0x30
[ 1525.435467]  kasan_atomics_helper+0x154c/0x4858
[ 1525.435485]  kasan_atomics+0x198/0x2e0
[ 1525.435501]  kunit_try_run_case+0x170/0x3f0
[ 1525.435517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.435535]  kthread+0x328/0x630
[ 1525.435548]  ret_from_fork+0x10/0x20
[ 1525.435564] 
[ 1525.435568] Allocated by task 336:
[ 1525.435576]  kasan_save_stack+0x3c/0x68
[ 1525.435591]  kasan_save_track+0x20/0x40
[ 1525.435605]  kasan_save_alloc_info+0x40/0x58
[ 1525.435617]  __kasan_kmalloc+0xd4/0xd8
[ 1525.435630]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.435644]  kasan_atomics+0xb8/0x2e0
[ 1525.435658]  kunit_try_run_case+0x170/0x3f0
[ 1525.435671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.435687]  kthread+0x328/0x630
[ 1525.435697]  ret_from_fork+0x10/0x20
[ 1525.435710] 
[ 1525.435714] The buggy address belongs to the object at ffff000826289e00
[ 1525.435714]  which belongs to the cache kmalloc-64 of size 64
[ 1525.435731] The buggy address is located 0 bytes to the right of
[ 1525.435731]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.435750] 
[ 1525.435755] The buggy address belongs to the physical page:
[ 1525.435763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.435777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.435791] page_type: f5(slab)
[ 1525.435801] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.435816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.435827] page dumped because: kasan: bad access detected
[ 1525.435835] 
[ 1525.435840] Memory state around the buggy address:
[ 1525.435847]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.435860]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.435872] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.435883]                                      ^
[ 1525.435892]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.435904]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.435915] ==================================================================
[ 1525.435928] ==================================================================
[ 1525.435938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[ 1525.435953] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.435967] 
[ 1525.435973] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.435998] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.436007] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.436016] Call trace:
[ 1525.436022]  show_stack+0x20/0x38 (C)
[ 1525.436037]  dump_stack_lvl+0x8c/0xd0
[ 1525.436053]  print_report+0x118/0x608
[ 1525.436071]  kasan_report+0xdc/0x128
[ 1525.436088]  kasan_check_range+0x100/0x1a8
[ 1525.436107]  __kasan_check_write+0x20/0x30
[ 1525.436121]  kasan_atomics_helper+0x15b4/0x4858
[ 1525.436139]  kasan_atomics+0x198/0x2e0
[ 1525.436154]  kunit_try_run_case+0x170/0x3f0
[ 1525.436170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.436189]  kthread+0x328/0x630
[ 1525.436201]  ret_from_fork+0x10/0x20
[ 1525.436217] 
[ 1525.436221] Allocated by task 336:
[ 1525.436228]  kasan_save_stack+0x3c/0x68
[ 1525.436243]  kasan_save_track+0x20/0x40
[ 1525.436257]  kasan_save_alloc_info+0x40/0x58
[ 1525.436269]  __kasan_kmalloc+0xd4/0xd8
[ 1525.436282]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.436296]  kasan_atomics+0xb8/0x2e0
[ 1525.436309]  kunit_try_run_case+0x170/0x3f0
[ 1525.436322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.436338]  kthread+0x328/0x630
[ 1525.436348]  ret_from_fork+0x10/0x20
[ 1525.436360] 
[ 1525.436364] The buggy address belongs to the object at ffff000826289e00
[ 1525.436364]  which belongs to the cache kmalloc-64 of size 64
[ 1525.436381] The buggy address is located 0 bytes to the right of
[ 1525.436381]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.436400] 
[ 1525.436404] The buggy address belongs to the physical page:
[ 1525.436412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.436426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.436440] page_type: f5(slab)
[ 1525.436450] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.436465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.436476] page dumped because: kasan: bad access detected
[ 1525.436484] 
[ 1525.436488] Memory state around the buggy address:
[ 1525.436496]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.436509]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.436521] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.436532]                                      ^
[ 1525.436541]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.436554]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.436565] ==================================================================
[ 1525.439796] ==================================================================
[ 1525.439806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[ 1525.439821] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.439835] 
[ 1525.439841] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.439867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.439875] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.439885] Call trace:
[ 1525.439890]  show_stack+0x20/0x38 (C)
[ 1525.439906]  dump_stack_lvl+0x8c/0xd0
[ 1525.439923]  print_report+0x118/0x608
[ 1525.439940]  kasan_report+0xdc/0x128
[ 1525.439958]  kasan_check_range+0x100/0x1a8
[ 1525.439976]  __kasan_check_write+0x20/0x30
[ 1525.439990]  kasan_atomics_helper+0x175c/0x4858
[ 1525.440007]  kasan_atomics+0x198/0x2e0
[ 1525.440023]  kunit_try_run_case+0x170/0x3f0
[ 1525.440040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.440059]  kthread+0x328/0x630
[ 1525.440071]  ret_from_fork+0x10/0x20
[ 1525.440087] 
[ 1525.440091] Allocated by task 336:
[ 1525.440098]  kasan_save_stack+0x3c/0x68
[ 1525.440112]  kasan_save_track+0x20/0x40
[ 1525.440127]  kasan_save_alloc_info+0x40/0x58
[ 1525.440137]  __kasan_kmalloc+0xd4/0xd8
[ 1525.440152]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.440166]  kasan_atomics+0xb8/0x2e0
[ 1525.440178]  kunit_try_run_case+0x170/0x3f0
[ 1525.440192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.440208]  kthread+0x328/0x630
[ 1525.440217]  ret_from_fork+0x10/0x20
[ 1525.440230] 
[ 1525.440234] The buggy address belongs to the object at ffff000826289e00
[ 1525.440234]  which belongs to the cache kmalloc-64 of size 64
[ 1525.440250] The buggy address is located 0 bytes to the right of
[ 1525.440250]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.440269] 
[ 1525.440274] The buggy address belongs to the physical page:
[ 1525.440281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.440295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.440309] page_type: f5(slab)
[ 1525.440319] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.440334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.440345] page dumped because: kasan: bad access detected
[ 1525.440353] 
[ 1525.440358] Memory state around the buggy address:
[ 1525.440366]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.440378]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.440391] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.440402]                                      ^
[ 1525.440410]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.440422]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.440433] ==================================================================
[ 1525.440460] ==================================================================
[ 1525.440471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[ 1525.440487] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.440501] 
[ 1525.440507] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.440533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.440541] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.440550] Call trace:
[ 1525.440556]  show_stack+0x20/0x38 (C)
[ 1525.440571]  dump_stack_lvl+0x8c/0xd0
[ 1525.440588]  print_report+0x118/0x608
[ 1525.440605]  kasan_report+0xdc/0x128
[ 1525.440623]  __asan_report_load8_noabort+0x20/0x30
[ 1525.440638]  kasan_atomics_helper+0x3e20/0x4858
[ 1525.440655]  kasan_atomics+0x198/0x2e0
[ 1525.440671]  kunit_try_run_case+0x170/0x3f0
[ 1525.440687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.440706]  kthread+0x328/0x630
[ 1525.440719]  ret_from_fork+0x10/0x20
[ 1525.440735] 
[ 1525.440739] Allocated by task 336:
[ 1525.440746]  kasan_save_stack+0x3c/0x68
[ 1525.440761]  kasan_save_track+0x20/0x40
[ 1525.440775]  kasan_save_alloc_info+0x40/0x58
[ 1525.440786]  __kasan_kmalloc+0xd4/0xd8
[ 1525.440799]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.440813]  kasan_atomics+0xb8/0x2e0
[ 1525.440826]  kunit_try_run_case+0x170/0x3f0
[ 1525.440839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.440855]  kthread+0x328/0x630
[ 1525.440864]  ret_from_fork+0x10/0x20
[ 1525.440877] 
[ 1525.440881] The buggy address belongs to the object at ffff000826289e00
[ 1525.440881]  which belongs to the cache kmalloc-64 of size 64
[ 1525.440898] The buggy address is located 0 bytes to the right of
[ 1525.440898]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.440917] 
[ 1525.440921] The buggy address belongs to the physical page:
[ 1525.440929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.440944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.440957] page_type: f5(slab)
[ 1525.440967] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.440982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.440993] page dumped because: kasan: bad access detected
[ 1525.441002] 
[ 1525.441006] Memory state around the buggy address:
[ 1525.441014]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.441026]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.441038] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.441049]                                      ^
[ 1525.441058]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.441070]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.441080] ==================================================================
[ 1525.436607] ==================================================================
[ 1525.436619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[ 1525.436635] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.436649] 
[ 1525.436655] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.436682] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.436690] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.436700] Call trace:
[ 1525.436705]  show_stack+0x20/0x38 (C)
[ 1525.436721]  dump_stack_lvl+0x8c/0xd0
[ 1525.436738]  print_report+0x118/0x608
[ 1525.436755]  kasan_report+0xdc/0x128
[ 1525.436772]  __asan_report_load8_noabort+0x20/0x30
[ 1525.436787]  kasan_atomics_helper+0x3db0/0x4858
[ 1525.436805]  kasan_atomics+0x198/0x2e0
[ 1525.436821]  kunit_try_run_case+0x170/0x3f0
[ 1525.436837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.436855]  kthread+0x328/0x630
[ 1525.436867]  ret_from_fork+0x10/0x20
[ 1525.436883] 
[ 1525.436887] Allocated by task 336:
[ 1525.436894]  kasan_save_stack+0x3c/0x68
[ 1525.436909]  kasan_save_track+0x20/0x40
[ 1525.436923]  kasan_save_alloc_info+0x40/0x58
[ 1525.436934]  __kasan_kmalloc+0xd4/0xd8
[ 1525.436949]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.436962]  kasan_atomics+0xb8/0x2e0
[ 1525.436975]  kunit_try_run_case+0x170/0x3f0
[ 1525.436988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.437004]  kthread+0x328/0x630
[ 1525.437013]  ret_from_fork+0x10/0x20
[ 1525.437026] 
[ 1525.437030] The buggy address belongs to the object at ffff000826289e00
[ 1525.437030]  which belongs to the cache kmalloc-64 of size 64
[ 1525.437047] The buggy address is located 0 bytes to the right of
[ 1525.437047]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.437066] 
[ 1525.437070] The buggy address belongs to the physical page:
[ 1525.437078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.437093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.437106] page_type: f5(slab)
[ 1525.437117] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.437131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.437142] page dumped because: kasan: bad access detected
[ 1525.437151] 
[ 1525.437155] Memory state around the buggy address:
[ 1525.437163]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.437176]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.437188] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.437198]                                      ^
[ 1525.437207]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.437220]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.437231] ==================================================================
[ 1525.441093] ==================================================================
[ 1525.441103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[ 1525.441118] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.441132] 
[ 1525.441138] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.441164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.441172] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.441181] Call trace:
[ 1525.441187]  show_stack+0x20/0x38 (C)
[ 1525.441202]  dump_stack_lvl+0x8c/0xd0
[ 1525.441219]  print_report+0x118/0x608
[ 1525.441237]  kasan_report+0xdc/0x128
[ 1525.441254]  kasan_check_range+0x100/0x1a8
[ 1525.441273]  __kasan_check_write+0x20/0x30
[ 1525.441288]  kasan_atomics_helper+0x17ec/0x4858
[ 1525.441305]  kasan_atomics+0x198/0x2e0
[ 1525.441321]  kunit_try_run_case+0x170/0x3f0
[ 1525.441337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.441356]  kthread+0x328/0x630
[ 1525.441369]  ret_from_fork+0x10/0x20
[ 1525.441384] 
[ 1525.441389] Allocated by task 336:
[ 1525.441396]  kasan_save_stack+0x3c/0x68
[ 1525.441410]  kasan_save_track+0x20/0x40
[ 1525.441424]  kasan_save_alloc_info+0x40/0x58
[ 1525.441435]  __kasan_kmalloc+0xd4/0xd8
[ 1525.441449]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.441463]  kasan_atomics+0xb8/0x2e0
[ 1525.441476]  kunit_try_run_case+0x170/0x3f0
[ 1525.441489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.441505]  kthread+0x328/0x630
[ 1525.441514]  ret_from_fork+0x10/0x20
[ 1525.441527] 
[ 1525.441532] The buggy address belongs to the object at ffff000826289e00
[ 1525.441532]  which belongs to the cache kmalloc-64 of size 64
[ 1525.441548] The buggy address is located 0 bytes to the right of
[ 1525.441548]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.441567] 
[ 1525.441571] The buggy address belongs to the physical page:
[ 1525.441579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.441593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.441606] page_type: f5(slab)
[ 1525.441617] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.441632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.441643] page dumped because: kasan: bad access detected
[ 1525.441651] 
[ 1525.441655] Memory state around the buggy address:
[ 1525.441663]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.441676]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.441688] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.441699]                                      ^
[ 1525.441708]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.441720]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.441731] ==================================================================
[ 1525.433334] ==================================================================
[ 1525.433344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[ 1525.433359] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.433373] 
[ 1525.433379] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.433405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.433413] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.433423] Call trace:
[ 1525.433428]  show_stack+0x20/0x38 (C)
[ 1525.433443]  dump_stack_lvl+0x8c/0xd0
[ 1525.433460]  print_report+0x118/0x608
[ 1525.433477]  kasan_report+0xdc/0x128
[ 1525.433494]  kasan_check_range+0x100/0x1a8
[ 1525.433513]  __kasan_check_write+0x20/0x30
[ 1525.433527]  kasan_atomics_helper+0x1414/0x4858
[ 1525.433544]  kasan_atomics+0x198/0x2e0
[ 1525.433560]  kunit_try_run_case+0x170/0x3f0
[ 1525.433576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.433594]  kthread+0x328/0x630
[ 1525.433606]  ret_from_fork+0x10/0x20
[ 1525.433622] 
[ 1525.433626] Allocated by task 336:
[ 1525.433633]  kasan_save_stack+0x3c/0x68
[ 1525.433648]  kasan_save_track+0x20/0x40
[ 1525.433662]  kasan_save_alloc_info+0x40/0x58
[ 1525.433673]  __kasan_kmalloc+0xd4/0xd8
[ 1525.433687]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.433701]  kasan_atomics+0xb8/0x2e0
[ 1525.433714]  kunit_try_run_case+0x170/0x3f0
[ 1525.433727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.433742]  kthread+0x328/0x630
[ 1525.433752]  ret_from_fork+0x10/0x20
[ 1525.433764] 
[ 1525.433769] The buggy address belongs to the object at ffff000826289e00
[ 1525.433769]  which belongs to the cache kmalloc-64 of size 64
[ 1525.433785] The buggy address is located 0 bytes to the right of
[ 1525.433785]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.433804] 
[ 1525.433809] The buggy address belongs to the physical page:
[ 1525.433816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.433831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.433844] page_type: f5(slab)
[ 1525.433855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.433869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.433880] page dumped because: kasan: bad access detected
[ 1525.433888] 
[ 1525.433893] Memory state around the buggy address:
[ 1525.433901]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.433913]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.433925] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.433936]                                      ^
[ 1525.433945]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.433958]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.433968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 1523.219577] ==================================================================
[ 1523.219598] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[ 1523.219631] Write of size 1 at addr ffff000800d20ef0 by task kunit_try_catch/227
[ 1523.219663] 
[ 1523.219677] CPU: 5 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.219735] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.219753] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.219773] Call trace:
[ 1523.219784]  show_stack+0x20/0x38 (C)
[ 1523.219820]  dump_stack_lvl+0x8c/0xd0
[ 1523.219857]  print_report+0x118/0x608
[ 1523.219896]  kasan_report+0xdc/0x128
[ 1523.219934]  __asan_report_store1_noabort+0x20/0x30
[ 1523.219970]  krealloc_more_oob_helper+0x5c0/0x678
[ 1523.220010]  krealloc_more_oob+0x20/0x38
[ 1523.220046]  kunit_try_run_case+0x170/0x3f0
[ 1523.220083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.220127]  kthread+0x328/0x630
[ 1523.220156]  ret_from_fork+0x10/0x20
[ 1523.220192] 
[ 1523.220202] Allocated by task 227:
[ 1523.220218]  kasan_save_stack+0x3c/0x68
[ 1523.220250]  kasan_save_track+0x20/0x40
[ 1523.220281]  kasan_save_alloc_info+0x40/0x58
[ 1523.220308]  __kasan_krealloc+0x118/0x178
[ 1523.220340]  krealloc_noprof+0x128/0x360
[ 1523.220371]  krealloc_more_oob_helper+0x168/0x678
[ 1523.220403]  krealloc_more_oob+0x20/0x38
[ 1523.220432]  kunit_try_run_case+0x170/0x3f0
[ 1523.220463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.220500]  kthread+0x328/0x630
[ 1523.220523]  ret_from_fork+0x10/0x20
[ 1523.220551] 
[ 1523.220560] The buggy address belongs to the object at ffff000800d20e00
[ 1523.220560]  which belongs to the cache kmalloc-256 of size 256
[ 1523.220597] The buggy address is located 5 bytes to the right of
[ 1523.220597]  allocated 235-byte region [ffff000800d20e00, ffff000800d20eeb)
[ 1523.220640] 
[ 1523.220650] The buggy address belongs to the physical page:
[ 1523.220667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20
[ 1523.220700] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 1523.220730] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 1523.220762] page_type: f5(slab)
[ 1523.220787] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.220821] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.220856] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.220891] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.220926] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff
[ 1523.220960] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[ 1523.220985] page dumped because: kasan: bad access detected
[ 1523.221003] 
[ 1523.221012] Memory state around the buggy address:
[ 1523.221031]  ffff000800d20d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.221059]  ffff000800d20e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1523.221088] >ffff000800d20e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 1523.221112]                                                              ^
[ 1523.221137]  ffff000800d20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.221165]  ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.221189] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 1523.212283] ==================================================================
[ 1523.212310] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[ 1523.212343] Free of addr ffff0008261f4001 by task kunit_try_catch/221
[ 1523.212370] 
[ 1523.212384] CPU: 4 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.212443] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.212460] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.212481] Call trace:
[ 1523.212492]  show_stack+0x20/0x38 (C)
[ 1523.212528]  dump_stack_lvl+0x8c/0xd0
[ 1523.212565]  print_report+0x118/0x608
[ 1523.212604]  kasan_report_invalid_free+0xc0/0xe8
[ 1523.212646]  __kasan_kfree_large+0x5c/0xa8
[ 1523.212686]  free_large_kmalloc+0x68/0x150
[ 1523.212722]  kfree+0x270/0x3c8
[ 1523.212754]  kmalloc_large_invalid_free+0x108/0x270
[ 1523.212792]  kunit_try_run_case+0x170/0x3f0
[ 1523.212830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.213123] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[ 1523.217944] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[ 1523.217980] Write of size 1 at addr ffff000800d20eeb by task kunit_try_catch/227
[ 1523.218013] 
[ 1523.218027] CPU: 5 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.218085] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.218103] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.218124] Call trace:
[ 1523.218135]  show_stack+0x20/0x38 (C)
[ 1523.218170]  dump_stack_lvl+0x8c/0xd0
[ 1523.218208]  print_report+0x118/0x608
[ 1523.218247]  kasan_report+0xdc/0x128
[ 1523.218285]  __asan_report_store1_noabort+0x20/0x30
[ 1523.218321]  krealloc_more_oob_helper+0x60c/0x678
[ 1523.218361]  krealloc_more_oob+0x20/0x38
[ 1523.218397]  kunit_try_run_case+0x170/0x3f0
[ 1523.218435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.218479]  kthread+0x328/0x630
[ 1523.218509]  ret_from_fork+0x10/0x20
[ 1523.218545] 
[ 1523.218554] Allocated by task 227:
[ 1523.218571]  kasan_save_stack+0x3c/0x68
[ 1523.218603]  kasan_save_track+0x20/0x40
[ 1523.218635]  kasan_save_alloc_info+0x40/0x58
[ 1523.218662]  __kasan_krealloc+0x118/0x178
[ 1523.218694]  krealloc_noprof+0x128/0x360
[ 1523.218726]  krealloc_more_oob_helper+0x168/0x678
[ 1523.218758]  krealloc_more_oob+0x20/0x38
[ 1523.218788]  kunit_try_run_case+0x170/0x3f0
[ 1523.218819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.218856]  kthread+0x328/0x630
[ 1523.218879]  ret_from_fork+0x10/0x20
[ 1523.218908] 
[ 1523.218917] The buggy address belongs to the object at ffff000800d20e00
[ 1523.218917]  which belongs to the cache kmalloc-256 of size 256
[ 1523.218954] The buggy address is located 0 bytes to the right of
[ 1523.218954]  allocated 235-byte region [ffff000800d20e00, ffff000800d20eeb)
[ 1523.218997] 
[ 1523.219007] The buggy address belongs to the physical page:
[ 1523.219025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20
[ 1523.219058] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 1523.219088] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 1523.219121] page_type: f5(slab)
[ 1523.219147] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.219181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.219217] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.219251] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.219286] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff
[ 1523.219320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[ 1523.219346] page dumped because: kasan: bad access detected
[ 1523.219364] 
[ 1523.219373] Memory state around the buggy address:
[ 1523.219392]  ffff000800d20d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.219421]  ffff000800d20e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1523.219450] >ffff000800d20e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 1523.219473]                                                           ^
[ 1523.219498]  ffff000800d20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.219526]  ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.219550] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 1523.210174] ==================================================================
[ 1523.210202] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[ 1523.210236] Read of size 1 at addr ffff000827890000 by task kunit_try_catch/219
[ 1523.210267] 
[ 1523.210282] CPU: 3 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.210341] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.210358] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.210379] Call trace:
[ 1523.210390]  show_stack+0x20/0x38 (C)
[ 1523.210426]  dump_stack_lvl+0x8c/0xd0
[ 1523.210465]  print_report+0x118/0x608
[ 1523.210504]  kasan_report+0xdc/0x128
[ 1523.210542]  __asan_report_load1_noabort+0x20/0x30
[ 1523.210577]  kmalloc_large_uaf+0x2cc/0x2f8
[ 1523.210612]  kunit_try_run_case+0x170/0x3f0
[ 1523.210650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.210694]  kthread+0x328/0x630
[ 1523.210724]  ret_from_fork+0x10/0x20
[ 1523.210760] 
[ 1523.210770] The buggy address belongs to the physical page:
[ 1523.210787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7890
[ 1523.210819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1523.210860] raw: 0bfffe0000000000 fffffdffe09e2508 ffff000935e10c40 0000000000000000
[ 1523.210894] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 1523.210919] page dumped because: kasan: bad access detected
[ 1523.210937] 
[ 1523.210946] Memory state around the buggy address:
[ 1523.210965]  ffff00082788ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 1523.210994]  ffff00082788ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 1523.211023] >ffff000827890000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 1523.211047]                    ^
[ 1523.211064]  ffff000827890080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 1523.211092]  ffff000827890100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 1523.211116] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-cpu_set_hyp_vector
[ 1516.430544] ==================================================================
[ 1516.430553] BUG: KASAN: global-out-of-bounds in cpu_set_hyp_vector+0x190/0x1b0
[ 1516.430579] Read of size 8 at addr ffff800087a64bc0 by task cpuhp/1/21
[ 1516.430590] 
[ 1516.430600] CPU: 1 UID: 0 PID: 21 Comm: cpuhp/1 Tainted: G        W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1516.430620] Tainted: [W]=WARN, [N]=TEST
[ 1516.430626] Hardware name: ARM Juno development board (r2) (DT)
[ 1516.430633] Call trace:
[ 1516.430639]  show_stack+0x20/0x38 (C)
[ 1516.430655]  dump_stack_lvl+0x8c/0xd0
[ 1516.430672]  print_report+0x310/0x608
[ 1516.430690]  kasan_report+0xdc/0x128
[ 1516.430705]  __asan_report_load8_noabort+0x20/0x30
[ 1516.430718]  cpu_set_hyp_vector+0x190/0x1b0
[ 1516.430733]  cpu_hyp_init+0x80/0x108
[ 1516.430746]  kvm_arch_enable_virtualization_cpu+0x28/0x98
[ 1516.430763]  kvm_enable_virtualization_cpu+0x74/0x118
[ 1516.430779]  kvm_online_cpu+0x18/0x30
[ 1516.430792]  cpuhp_invoke_callback+0x5b8/0x1620
[ 1516.430810]  cpuhp_thread_fun+0x230/0x5d8
[ 1516.430827]  smpboot_thread_fn+0x2e8/0x760
[ 1516.430843]  kthread+0x328/0x630
[ 1516.430855]  ret_from_fork+0x10/0x20
[ 1516.430870] 
[ 1516.430874] The buggy address belongs to the variable:
[ 1516.430878]  hyp_spectre_vector_selector+0x20/0x40
[ 1516.430894] 
[ 1516.430900] The buggy address belongs to the virtual mapping at
[ 1516.430900]  [ffff800085c60000, ffff800087b81000) created by:
[ 1516.430900]  paging_init+0x66c/0x7d0
[ 1516.430918] 
[ 1516.430923] The buggy address belongs to the physical page:
[ 1516.430930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87c64
[ 1516.430943] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 1516.430963] raw: 03fffe0000002000 fffffdffc01f1908 fffffdffc01f1908 0000000000000000
[ 1516.430973] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 1516.430980] page dumped because: kasan: bad access detected
[ 1516.430985] 
[ 1516.430989] Memory state around the buggy address:
[ 1516.430995]  ffff800087a64a80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[ 1516.431004]  ffff800087a64b00: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[ 1516.431012] >ffff800087a64b80: f9 f9 f9 f9 00 00 00 00 f9 f9 f9 f9 01 f9 f9 f9
[ 1516.431018]                                            ^
[ 1516.431025]  ffff800087a64c00: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
[ 1516.431033]  ffff800087a64c80: 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[ 1516.431039] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[ 1571.257089] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#5: kunit_try_catch/729
[ 1571.320186] Modules linked in:
[ 1571.323298] CPU: 5 UID: 0 PID: 729 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1571.334512] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[ 1571.340379] Hardware name: ARM Juno development board (r2) (DT)
[ 1571.346336] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1571.353350] pc : intlog10+0x38/0x48
[ 1571.356885] lr : intlog10_test+0xe4/0x200
[ 1571.360938] sp : ffff80008ade7c10
[ 1571.364280] x29: ffff80008ade7c90 x28: 0000000000000000 x27: 0000000000000000
[ 1571.371504] x26: 1fffe001001e4741 x25: 0000000000000000 x24: ffff80008ade7ce0
[ 1571.378724] x23: ffff80008ade7d00 x22: 0000000000000000 x21: 1ffff000115bcf82
[ 1571.385945] x20: ffff800083bfcb60 x19: ffff800087d07990 x18: 00000000970c792d
[ 1571.393167] x17: 0000000000000001 x16: ffff000935e50d28 x15: 00000000938f8781
[ 1571.400386] x14: 0000000000000000 x13: 1fffe00126bca189 x12: ffff700010f52389
[ 1571.407607] x11: 1ffff00010f52388 x10: ffff700010f52388 x9 : ffff80008123d25c
[ 1571.414827] x8 : ffff800087a91c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[ 1571.422047] x5 : ffff7000115bcf82 x4 : 1ffff00010fa0f3b x3 : 1ffff0001077f96c
[ 1571.429266] x2 : 1ffff0001077f96c x1 : 0000000000000003 x0 : 0000000000000000
[ 1571.436486] Call trace:
[ 1571.438958]  intlog10+0x38/0x48 (P)
[ 1571.442497]  kunit_try_run_case+0x170/0x3f0
[ 1571.446733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1571.452279]  kthread+0x328/0x630
[ 1571.455553]  ret_from_fork+0x10/0x20
[ 1571.459182] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[ 1570.397883] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#3: kunit_try_catch/711
[ 1571.100215] Modules linked in:
[ 1571.103323] CPU: 3 UID: 0 PID: 711 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1571.114538] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[ 1571.120406] Hardware name: ARM Juno development board (r2) (DT)
[ 1571.126363] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1571.133377] pc : intlog2+0xd8/0xf8
[ 1571.136826] lr : intlog2_test+0xe4/0x200
[ 1571.140793] sp : ffff80008ace7c10
[ 1571.144135] x29: ffff80008ace7c90 x28: 0000000000000000 x27: 0000000000000000
[ 1571.151359] x26: 1fffe001049a0781 x25: 0000000000000000 x24: ffff80008ace7ce0
[ 1571.158581] x23: ffff80008ace7d00 x22: 0000000000000000 x21: 1ffff0001159cf82
[ 1571.165800] x20: ffff800083bfca60 x19: ffff800087d07990 x18: 0000000043bd4e3d
[ 1571.173020] x17: 00000000a716c23f x16: 000000006c8c128a x15: 00000000f5fb0e96
[ 1571.180241] x14: 0000000000000000 x13: 1fffe00126bc1989 x12: ffff700010f52389
[ 1571.187462] x11: 1ffff00010f52388 x10: ffff700010f52388 x9 : ffff80008123d45c
[ 1571.194682] x8 : ffff800087a91c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[ 1571.201902] x5 : ffff70001159cf82 x4 : 1ffff00010fa0f3b x3 : 1ffff0001077f94c
[ 1571.209122] x2 : 1ffff0001077f94c x1 : 0000000000000003 x0 : 0000000000000000
[ 1571.216341] Call trace:
[ 1571.218811]  intlog2+0xd8/0xf8 (P)
[ 1571.222264]  kunit_try_run_case+0x170/0x3f0
[ 1571.226500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1571.232047]  kthread+0x328/0x630
[ 1571.235321]  ret_from_fork+0x10/0x20
[ 1571.238950] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - uboot-action
(no logs available)
Failure - lava - uboot-commands
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - exception-warning-kerneltimeclockevents-at-cev_delta2ns KNOWN ISSUE - Juno-r2 WARNING kernel time clockevents.c cev_delta2ns clockevents_config.part
------------[ cut here ]------------
[    0.000000] WARNING: kernel/time/clockevents.c:38 at cev_delta2ns+0xf4/0x1c0, CPU#0: swapper/0/0
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.16.0-rc3-next-20250626 #1 PREEMPT 
[    0.000000] Hardware name: ARM Juno development board (r2) (DT)
[    0.000000] pstate: 100000c5 (nzcV daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : cev_delta2ns+0xf4/0x1c0
[    0.000000] lr : clockevents_config.part.0+0xa4/0x160
[    0.000000] sp : ffff800085c67b20
[    0.000000] x29: ffff800085c67b20 x28: 0000000000000400 x27: 0000000000000000
[    0.000000] x26: ffff0008002d0c70 x25: 1fffe0010005a18e x24: 1fffe0010005a18e
[    0.000000] x23: 0000000000000004 x22: ffff0008002d0c74 x21: 0000000000000020
[    0.000000] x20: 000000000000000f x19: 0000000f00000000 x18: ffff700010b8cefb
[    0.000000] x17: ffff8000857ae65c x16: ffff8000857b3470 x15: ffff8000857b26a0
[    0.000000] x14: ffff8000808f0ffc x13: ffff8000856b2e44 x12: ffff700010f5cf3f
[    0.000000] x11: 1ffff00010f5cf3e x10: ffff700010f5cf3e x9 : ffff8000803d47ec
[    0.000000] x8 : ffff800087ae79f0 x7 : 000000001dcd6500 x6 : 000000003b9aca00
[    0.000000] x5 : 1fffe0010005a18e x4 : 0000000000000003 x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : ffff0008002d0c40 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  cev_delta2ns+0xf4/0x1c0 (P)
[    0.000000]  clockevents_config.part.0+0xa4/0x160
[    0.000000]  clockevents_config_and_register+0x8c/0xf0
[    0.000000]  arch_timer_mem_frame_register+0x2fc/0x4f8
[    0.000000]  arch_timer_mem_of_init+0x408/0x560
[    0.000000]  timer_probe+0xf4/0x1d0
[    0.000000]  time_init+0x24/0x98
[    0.000000]  start_kernel+0x1cc/0x3d0
[    0.000000]  __primary_switched+0x8c/0xa0
[    0.000000] ---[ end trace 0000000000000000 ]---